Streaming issues? Report here
Clement Manyathela 1500 x 1500 2020 Clement Manyathela 1500 x 1500 2020
The Clement Manyathela Show
09:00 - 12:00
volume_up
volume_mute

Up Next: The Midday Report with Mandy Wiener
See full line-up
The Clement Manyathela Show
09:00 - 12:00
Home
arrow_forward

Bug bounty hunters, bringing law and order to the web's wild west

16 March 2016 7:10 PM
by

Software bugs can cost millions. This a salute to those that search for them so you don't have to worry about them.

When the World Economic Forum announced that we are heading into the 4th Industrial Revolution, the focus was on the many jobs at risk of being replaced by machines.

The flip side is that the change will also create jobs we have not had before. One of those is as a bug bounty hunter. They are freelance programmers and security enthusiasts that try to find vulnerabilities in software and operating systems.

A recent exploit discovered by a programmer in India found that there was a simple way to request access to anyone’s Facebook account, gaining access to their private photos and other personal information including banking details if cards had been associated with the account. For reporting the issue to Facebook he was awarded $15 000 (R240 000).

He might have stood to make a lot more if he sold that information to criminal hackers.

A brief history

Initially computer systems were written and used within companies with only a few staff having access. The systems, while cutting edge for their time, did not really offer much reward for someone if if they did hack it.

Microsoft was one of the first to create software intended to be used by millions of users on millions of machines, many while connected to the internet. The volume of people using the system on a wide range of machines often resulted in a “blue screen of death” when the code encountered a situation it did not know how to deal with. The solution was to turn off the machine and turn it on again (still a popular option when something goes wrong).

They then devised a system that would alert them when something unintended happened setting up the need for patches, fixes and updates we know so well now.

Back to the future and software has become a lot more powerful and responsible for looking after almost every aspect of our lives. It would be almost impossible to release software that did not have some unintended situation to deal with so the effort is placed in fixing the issues as they are noticed rather than to create something that is perfect.

The bounty hunters

The race to find those issues is shared between the software creators using the software itself to report issues, from users (often unhappy to discover the fault), hackers looking to exploit the issue for their benefit and the bug hunters, who enjoy being able to use their skills to contribute to the improvement of software.

It is a powerful sentiment in the coding community with the premise that open source software using a collective effort can build something that is free for everyone to use. The best known open source system is Android which is the operation system for a growing number, if not most, mobile phones. It is based on Linux, one of the original operating systems and the most common system used by the servers connecting the planet’s network of computers.

Some systems are considered so crucial to the smooth operation of the internet that a special panel has been created to manage the tracking of security issues affecting those systems and rewards those that contribute to improving it via the Internet Bug Bounty.

But there are many more companies that welcome the contributions and those programs are listed via others such as Bug Crowd.

The biggest bug of all

Average users might wonder why so much complicated programming is needed to achieve relatively simple tasks. And despite lots of warnings users also tend to absolve themselves for taking a more active part in understanding how a system works and how it can be exploited.

This is the primary weakness those looking to compromise a system for criminal or malicious reasons target, trusting that as the systems get more sophisticated the users remain relatively naive.

Consider a scenario of someone needing to move goods around inside a shop. He might use a trolley. Loading it up and pushing it where it needs to go solves his problem. In time the need arises to move items between shops and a trolley is replaced with a delivery vehicle. You would not argue as you are still simply moving goods; you do not need licence to use the vehicle.

Early phones were like trolleys; the thing in your pocket is a delivery vehicle. When used correctly a huge convenience but, when you are unaware of how it can be used, a significant hazard.

The best way to avoid becoming a cyber-security statistic is understanding a little more about how you connect with the world digitally.

Forget remembering passwords, get a password manager. Use a different login for each site while only remembering the login for the password manager.

Don’t follow links from emails to site that require a login. Check a site’s safety first when using a desktop PC via Google.

Following the simple steps above will allow bug bounty hunters to focus on the bugs that make the software work better not the ones that you unknowingly gift to cyber criminals.

If you wondered why they are called "bugs", read this.


16 March 2016 7:10 PM
by

More from Business Unusual

Maize field mealie farm farmer agriculture 123rf 123rfbusiness 123rflifestyle

Regenerative agriculture - an idea 12 000 years in the making

21 October 2020 7:15 PM

The future of agriculture may draw more from its past than the present

Share this:
Read More arrow_forward

battery-charging-aa

South Africa needs batteries, here are some we might use

14 October 2020 7:15 PM

Over 1000 MW of renewable energy will be added to the grid in the next year, we need a way to store it.

Share this:
Read More arrow_forward

Stock indicator candlesticks 123rf business

A business bedtime story about Robinhood

7 October 2020 7:15 PM

New investment platforms are making it easy and cheap to invest, what could go wrong?

Share this:
Read More arrow_forward

Recycling logo

An inconvenient truth - plastic recycling does not actually work

30 September 2020 7:29 PM

Most plastic was never intended to be recycled, but we have believed the story for decades

Share this:
Read More arrow_forward

123rf smart home automation

Are you ready to make your home smarter?

9 September 2020 7:30 PM

The cost and benefits are making home automation easy and affordable

Share this:
Read More arrow_forward

stock price line chart candlestick

How the Dow Jones Industrial Index tracks the state of the US stock market

2 September 2020 7:47 PM

Almost a century after it began the last original stock is removed from the index

Share this:
Read More arrow_forward

invitation to fight emoji 123rf

Epic, Apple and Google, who is the bad guy?

19 August 2020 7:15 PM

You be the judge and consider the potential arguments and outcomes

Share this:
Read More arrow_forward

Dandelion flower

It has not been a good year for rubber

12 August 2020 7:15 PM

The wheels may be coming off for the substance gets us around the world

Share this:
Read More arrow_forward

Crisis just ahead dark clouds thunderstorm 123rf 123rfbusiness

A warning for the future, we do not think enough about our actions

5 August 2020 7:15 PM

Despite being one of the few animals that think about the future, we don’t think far enough

Share this:
Read More arrow_forward

Dumpster Fire Bill Ward Flickr

How social media became a dumpster fire and what to do about it

29 July 2020 7:15 PM

While it may feel things are getting worse they are starting to get better

Share this:
Read More arrow_forward