Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

Microsoft PowerPoint exploit used to bypass antivirus and spread malware

It's the first time this exploit has been used to target PowerPoint users - and it's being used to distribute powerful Trojan malware, say researchers.

Microsoft PowerPoint exploit used to bypass antivirus and spread malware

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Intel Launches Bug Bounty Program, Offers Rewards of Up to $30,000  (Read 31 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 22528
  • .: Surf Queen
    • WWW
Intel Launches Bug Bounty Program, Offers Rewards of Up to $30,000
17 March 2017, 1:01 am

Lagging behind many other tech companies, Intel has finally launched a bug bounty program, offering rewards of up to $30,000 for hardware vulnerabilities. 

The program is being run via HackerOne, which enlists white hats from all over the globe to find security vulnerabilities in various software, firmware or hardware, depending on the hiring company. 

"We want to encourage researchers to identify issues and bring them to us directly so that we can take prompt steps to evaluate and correct them, and we want to recognize researchers for the work that they put in when researching a vulnerability. By partnering constructively with the security research community, we believe we will be better able to protect our customers," reads the announcement. 

Get a score, get some cash

As per usual with this type of programs, the harder a vulnerability is to mitigate, the m... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle