-
Tips for becoming a good boxer - November 6, 2020
-
7 expert tips for making your hens night a memorable one - November 6, 2020
-
5 reasons to host your Christmas party on a cruise boat - November 6, 2020
-
What to do when you’re charged with a crime - November 6, 2020
-
Should you get one or multiple dogs? Here’s all you need to know - November 3, 2020
-
A Guide: How to Build Your Very Own Magic Mirror - February 14, 2019
-
Our Top Inspirational Baseball Stars - November 24, 2018
-
Five Tech Tools That Will Help You Turn Your Blog into a Business - November 24, 2018
-
How to Indulge on Vacation without Expanding Your Waist - November 9, 2018
-
5 Strategies for Businesses to Appeal to Today’s Increasingly Mobile-Crazed Customers - November 9, 2018
‘Hack the Pentagon’ Participants Discovered 138 Security Flaws with Five Government Websites
The Defense Department received at least one vulnerability report from more than 250 ethical hackers who took part in the department’s bug bounty program that occurred from April 18 to May 12, DoD News reported Friday. He ended up submitting six vulnerabilities, but they all were reported by other hackers also.
Advertisement
Outside of the bounty program, Carter noted, it’s hard for cyber researchers to report found DOD vulnerabilities.
The pilot program cost $150,000, including about $75,000 in reward prizes.
Defense officials said they were sufficiently encouraged by the pilot that they now want to extend the concept of “crowdsourced” cybersecurity beyond DoD’s top-level public web pages. Hack the Pentagon, though, was an eye-opener to how much these hackers could help.
“What we didn’t fully appreciate before this pilot was how many white-hat hackers there are”.
White-hat hackers in the Defense Department’s monthlong Hack the Pentagon bug bounty program found 138 vulnerabilities that the department has since remediated – and now Defense Secretary Ash Carter wants to make the model a fixture within DOD.
Back in March, the US’s Department of Defense launched a “Hack the Pentagon” campaign to get hackers to test their websites and security networks for vulnerabilities, without the threat of jail time. None of the Department’s critical networks were part of the competition. This is the thought process other companies should be adopting; bug bounty programs are beneficial to companies. In total, the pilot discovered and reported 138 “legitimate and unique” vulnerabilities.
Defense Media Activity quickly worked to remediate each of these vulnerabilities. Hiring an outside contractor to conduct a similar security test could have cost more than $1 million.
“[Arendt] is a prolific security researcher who helped us identify a number of vulnerabilities and [Dworken] is a high school student who lives right here in the Washington area”.
David stated, “It was a great experience”.
“Even without a bounty, these things are still, personally for me, incredibly rewarding”, he said.
The pilot marks the first in a series of programs created to test and find vulnerabilities in the department’s applications, websites and networks.
Advertisement
In the coming months, Lynch and the DDS team will be exploring ways to expand the bounty program to every level of the DoD, if possible.