ALL >> Computers >> View Article
Mozilla Has Developed Program For Information Security To Reward Experts To Find Vulnerabilities
Software developers and vendors of security products are faced with the challenge of developing secured products. However, it is difficult to anticipate and identify all vulnerabilities in advance. On the other hand, hackers always find ways to identify and exploit vulnerabilities, which results in security breaches. As such, computer security professionals are always under pressure to release security updates for vulnerabilities. In order to encourage information security to pre-empt hackers in identifying vulnerabilities, Mozilla foundation had initiated rewards program titled Bug Bounty Program. Mozilla follows Google, which had initiated a similar program a few months earlier.
Under the program, Mozilla foundation will pay cash prizes to researchers for identifying security holes in Mozilla's web applications. The foundation will dole out at least $500 for identifying high risk vulnerabilities. Mozilla will pay up to $3,000 to computer security professionals on revelation of highly critical vulnerabilities. ...
...
Usually, security professionals use ethical hacking practices to detect and mitigate vulnerabilities. The Bug Bounty Program encourages security professionals to identify the lapses in the source code, vulnerabilities related to authentication and session management. Mozilla cautions security experts against using automated tools as they may lead to disruption of services.
The reward programs by software developers aims at ensuring Internet security and timely availability of security updates.
The web applications, which are eligible for the bug bounty program include mozilla.com/org, getfirefox.com, addons.mozilla.org, services.addons.mozilla.org, download.mozilla.org, getpersonas.com, firefox.com, bugzilla.mozilla.org, versioncheck.addons.mozilla.org, pfs.mozilla.org and aus*.mozilla.org.
Vulnerabilities in web applications may lead to malicious attacks such as SQL injection attacks, iFrame injection attacks, cross-site scripting attack, phishing and brute force attacks among many others. Timely security updates are crucial to prevent exploitation of vulnerabilities by hackers. Hackers may gain unauthorized access, breach databases, gain remote access and disrupt web application services.
Identification of vulnerabilities by security professionals may help software developers to mitigate the vulnerabilities and to provide secured web browsing experience to end-users.
Add Comment
Computers Articles
1. What Identity Governance Really Means In Modern EnterprisesAuthor: Mansoor Alam
2. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates
3. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma
4. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions
5. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights
6. Power Bi Tutorial For Beginners: Learn Business Intelligence Step By Step
Author: Tech Point
7. Spark Matrix™: Data Governance Solutions
Author: Umangp
8. How Prediction Market Software Development Is Transforming Data-driven Decision Making
Author: david
9. Naming Development & Management
Author: brainbell10
10. Mysql Database Development & Management Services
Author: brainbell10
11. Mongodb Development & Management
Author: brainbell10
12. Spark Matrix™: Conversational Automation
Author: Umangp
13. How Care Home Software Helps Improve Daily Operations In Care Homes
Author: Centrim Life UK
14. Pc & Tech Stores: Latest Trends In Hardware And Accessories
Author: Jack Williams
15. The Infozed Blueprint: Powering The Modern Workspace
Author: suma






