16 min

S3 Ep19.5: How NOT to be a bug bounty hunte‪r‬ Naked Security

    • Technology

In this special mini-episode, Paul Ducklin talks to Sophos cybersecurity expert Chester Wisniewski about bug bounty hunting.



How does bug bounty hunting work? What should you do if you get a bug report that doesn't follow established protocol? Chester tells you how to deal with so-called "beg bounties", where self-styled "experts" beg you for money or even threaten you with ill-defined "problems" they claim to have found.



https://news.sophos.com/en-us/have-a-domain-name-beg-bounty-hunters-may-be-on-their-way



https://nakedsecurity.sophos.com/beware-of-technical-experts-bombarding-you-with-bug-reports



Original music by Edith Mudge



Got questions/suggestions/stories to share?

Email tips@sophos.com

Twitter @NakedSecurity

Instagram @NakedSecurity

In this special mini-episode, Paul Ducklin talks to Sophos cybersecurity expert Chester Wisniewski about bug bounty hunting.



How does bug bounty hunting work? What should you do if you get a bug report that doesn't follow established protocol? Chester tells you how to deal with so-called "beg bounties", where self-styled "experts" beg you for money or even threaten you with ill-defined "problems" they claim to have found.



https://news.sophos.com/en-us/have-a-domain-name-beg-bounty-hunters-may-be-on-their-way



https://nakedsecurity.sophos.com/beware-of-technical-experts-bombarding-you-with-bug-reports



Original music by Edith Mudge



Got questions/suggestions/stories to share?

Email tips@sophos.com

Twitter @NakedSecurity

Instagram @NakedSecurity

16 min

Top Podcasts In Technology