ALL >> Computers >> View Article
Mozilla Has Developed Program For Information Security To Reward Experts To Find Vulnerabilities

Software developers and vendors of security products are faced with the challenge of developing secured products. However, it is difficult to anticipate and identify all vulnerabilities in advance. On the other hand, hackers always find ways to identify and exploit vulnerabilities, which results in security breaches. As such, computer security professionals are always under pressure to release security updates for vulnerabilities. In order to encourage information security to pre-empt hackers in identifying vulnerabilities, Mozilla foundation had initiated rewards program titled Bug Bounty Program. Mozilla follows Google, which had initiated a similar program a few months earlier.
Under the program, Mozilla foundation will pay cash prizes to researchers for identifying security holes in Mozilla's web applications. The foundation will dole out at least $500 for identifying high risk vulnerabilities. Mozilla will pay up to $3,000 to computer security professionals on revelation of highly critical vulnerabilities. ...
...
Usually, security professionals use ethical hacking practices to detect and mitigate vulnerabilities. The Bug Bounty Program encourages security professionals to identify the lapses in the source code, vulnerabilities related to authentication and session management. Mozilla cautions security experts against using automated tools as they may lead to disruption of services.
The reward programs by software developers aims at ensuring Internet security and timely availability of security updates.
The web applications, which are eligible for the bug bounty program include mozilla.com/org, getfirefox.com, addons.mozilla.org, services.addons.mozilla.org, download.mozilla.org, getpersonas.com, firefox.com, bugzilla.mozilla.org, versioncheck.addons.mozilla.org, pfs.mozilla.org and aus*.mozilla.org.
Vulnerabilities in web applications may lead to malicious attacks such as SQL injection attacks, iFrame injection attacks, cross-site scripting attack, phishing and brute force attacks among many others. Timely security updates are crucial to prevent exploitation of vulnerabilities by hackers. Hackers may gain unauthorized access, breach databases, gain remote access and disrupt web application services.
Identification of vulnerabilities by security professionals may help software developers to mitigate the vulnerabilities and to provide secured web browsing experience to end-users.
Add Comment
Computers Articles
1. Loan Lending Apps: Simple Loans For Busy LivesAuthor: davidbeckam
2. Top Features Of Supplier Management Software And Supplier Portal Software
Author: sneha
3. How Health & Wellness Brands Are Using Whatsapp For Better Client Retention
Author: Connverz
4. Top Benefits Of Cloud-based Erp Solutions For Growing Enterprises
Author: sneha
5. Top 5 Sop Challenges And Data-backed Ways To Solve Them
Author: Alice White
6. How Can Grocery Api Data Scraping Help You Navigate Swiggy And Instamart Data?
Author: Mobile App Scraping
7. Etmf In The Era Of Digital Trials: Challenges, Innovations, And Opportunities
Author: Giselle Bates
8. Leverage Real-time Offer Intelligence For Food Delivery Apps
Author: Food Data Scrape
9. Top 10 Features To Look For In Sales Order Management Software In 2025
Author: sneha
10. 最佳且超棒的站群服务器
Author: 8U Cloud
11. How Cyber Ab Marketplace Supports C3pao And Cmmc Provisional Assessor
Author: Ariento Inc
12. Top 10 Benefits Of It Consulting Services For Your Business!
Author: GIGABITTechnologies
13. Unlocking App Success: Aso App Store Optimization In Bangaloreq
Author: Cubikeymedia
14. Looking For A Tableau Replacement? Try Helical Insight – Open Source Bi Tool
Author: Vhelical
15. Accidentally Deleted Files From Your Hard Drive? Here’s What To Do Next
Author: f2.technology