Remove fixing-data-breaches-part-4-bug-bounties
article thumbnail

Fixing Data Breaches Part 4: Bug Bounties

Troy Hunt

Over the course of this week, I've been writing about "Fixing Data Breaches" which focuses on actionable steps that can be taken to reduce the prevalence and the impact of these incidents. The Mechanics of a Bug Bounty. The Economics of Breaches and Bug Bounties.

article thumbnail

Fixing Data Breaches Part 5: Penalties

Troy Hunt

In the first 4 parts of "Fixing Data Breaches", I highlighted education , data ownership and minimisation , the ease of disclosure and bug bounties as ways of addressing the problem. This part of the series is also the hardest to implement. This is an incident where 4.8

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

No, Spotify Wasn't Hacked

Troy Hunt

Clearly a Spotify breach, right? If they had a breach then yes, hashes may be cracked, but that's not what's happening here. Regular readers will appreciate the mechanics of this already but all those who I point here for whom this is new, this attack simply takes exposed credentials from a data breach and tries them on another site.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

It is a vulnerability in SSL/TLS, protocols that are designed to protect data in transit. 4 characters. 4 characters. It would be a massive data breach. there was no upper limit and returning more data than it should have been allowed. There are a lot of dupes reported with, say, bug bounties, for example.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

It is a vulnerability in SSL/TLS, protocols that are designed to protect data in transit. 4 characters. 4 characters. It would be a massive data breach. there was no upper limit and returning more data than it should have been allowed. There are a lot of dupes reported with, say, bug bounties, for example.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

It is a vulnerability in SSL/TLS, protocols that are designed to protect data in transit. 4 characters. 4 characters. It would be a massive data breach. there was no upper limit and returning more data than it should have been allowed. There are a lot of dupes reported with, say, bug bounties, for example.