" />
Data Security

Modern cyber security: ethical hacking and bug bounties

Modern cyber security: ethical hacking and bug bounties
Ben Allen

As technology advances and the world marches closer to the Internet of Things, times have never been more profitable for hackers. Previously lumbered with the stereotype of sitting at home, in their pyjamas, ordering pizza and engaging in geeky banter on chat rooms – hackers are now sought after by the biggest companies.

Companies who’ve never had to think about online security before are concerned about the quality of their defences. For example, NewsLetter found a hacker who was able to hack into his school system to see the list of donors for its ongoing regeneration program. He also managed to jump through a series of programs for one company he was working for, and managed to turn of the heating in their chicken coop 300 miles away. Schools and chicken coops didn’t used to have to worry about hackers, and as more companies now do more security teams are goint to be required.

The Centre for Cyber Safety and Education predicts that by 2022, the global economy will be short of 1.8 million skilled security workers. And I think this may even be a low estimate – firstly, only recently has this kind of work involved any formal training; for the most part hacking has involved informal training almost by definition. Secondly, these are people who like to break things; there might be a small part in all of us that enjoys the idea of breaking things – but generally people go for making things instead. And finally, hackers don’t operate in the job market as people usually would, they’re deliberately elusive.

So big companies initially found it hard to find and get the attention of hackers. But they’ve found a way to bring them out of the woodwork with “bug-bounties”, cash rewards for being able to identify flaws in their security. HackerOne, who handle these kind of programs, told Reuters they’d paid out $18.8 million in the past 3 years to fix bugs, of which about half was in the last year alone.

The lure of being able to ply the craft you love without morals or the FBI getting in the way is proving to be big business. Microsoft will pay up to $250,000 in their bug bounty program. But it’s not just about cash, hackers still thrive on the reputation gained for uncovering a well hidden and well defended flaw. And they don’t even have to hang around to fix the bugs, the company running the program then needs to pick up the holes identified and fix them.

You’ve got to give it to the hackers, they haven’t been forced into a hole or undermined by “the establishment”. Rather, they’ve managed to bend everyone else to their way of working.

View Comments (1)

1 Comment

  1. Andrea Torti

    August 4, 2017 at 8:31 AM

    Definitely – hacking has its place in the Future of Work 🙂

Leave a Reply

Your email address will not be published. Required fields are marked *

Data Security
Ben Allen

Ben Allen is a traveler, a writer and a Brit. He worked in the London startup world for a while but really prefers commenting on it than working in it. He has huge faith in the tech industry and enjoys talking and writing about the social issues inherent in its development.

More in Data Security

data monetization

Companies make millions selling your data, why not sell it yourself?

Nicolas WaddellSeptember 8, 2017
data security

Personal information of over 140 million US citizens has been leaking for a month

Omar ElorfalySeptember 8, 2017

Is ‘free’ cloud storage really risk-free?

Guest ContributorAugust 21, 2016
Forgery

How you can protect hacked mobile apps from forgery

Guest ContributorJuly 7, 2016
ZeroDB

Interview with MacLane Wilkison: co-Founder of ZeroDB securities for big data & cloud

Tim HinchliffeJune 23, 2016
Database Security

Improving database security: facts, stats & how-to

Guest ContributorJune 13, 2016

Open source database security gets a significant boost

Guest ContributorApril 12, 2016

What companies need to start doing to keep their customers safe from data theft

Guest ContributorMarch 8, 2016

Drone Wars: The battle between competing UAV applications

Tim HinchliffeMarch 2, 2016