Naked Security

S3 Ep19.5: How NOT to be a bug bounty hunter


Listen Later

In this special mini-episode, Paul Ducklin talks to Sophos cybersecurity expert Chester Wisniewski about bug bounty hunting.


How does bug bounty hunting work? What should you do if you get a bug report that doesn't follow established protocol? Chester tells you how to deal with so-called "beg bounties", where self-styled "experts" beg you for money or even threaten you with ill-defined "problems" they claim to have found.


https://news.sophos.com/en-us/have-a-domain-name-beg-bounty-hunters-may-be-on-their-way


https://nakedsecurity.sophos.com/beware-of-technical-experts-bombarding-you-with-bug-reports


Original music by Edith Mudge


Got questions/suggestions/stories to share?

Twitter @NakedSecurity

Instagram @NakedSecurity

...more
View all episodesView all episodes
Download on the App Store

Naked SecurityBy Sophos

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

57 ratings


More shows like Naked Security

View all
DIS Unlimited by The DIS

DIS Unlimited

2,559 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,000 Listeners

The DCL Show by The DIS

The DCL Show

169 Listeners