April 26, 2016 By Douglas Bonderud 2 min read

Bugs are everywhere — and they’re ever-evolving. When internal IT teams track down and eliminate one bug, two more spring up in its place.

Rather than waiting for hackers to punch through and exploit these vulnerabilities, however, many organizations have turned to “bug bounty” initiatives, which encourage users to find and report critical bugs, often with the promise of a cash reward. Now MIT has jumped on the bandwagon and slapped down its own bug bounty program — but it’s a little off the beaten path.

‘Cash’ Rewards

According to SecurityWeek, the program is still in alpha testing and is only open to MIT affiliates who hold valid certificates. This group includes grads and undergrads but eliminates outside security firms, who are encouraged to report any found bugs to MIT’s security team.

So far, the bug bounty focuses on the student.mit.edu, atlas.mit.edu, learning-modules.mit.edu and bounty.mit.edu domains. If users find and report bugs, they’re asked to not disclose any information publicly until the vulnerability is patched, and they’re warned against using “noisy” scanners or conducting “disruptive” tests.

So what can bug trackers earn for their work? Cash — sort of. As Threatpost reports, the school is paying out in TechCASH, which can be used for food, books and various services near the university’s campus in Cambridge, Massachusetts.

The bug bounty website also makes it clear that TechCASH is not a “payment” for services and is awarded at the discretion of the school. In addition, bug hunters are not compensated for any time spent researching.

It’s also worth noting that the program has report restrictions: MIT is only willing to pay for details on remote code execution, SQL injection, authorization bypass, information leaks, cross-site scripting and cross-site request forgery vulnerabilities. DDoS, social engineering attacks and those vulnerabilities that require on-site access are off the table.

Bug Bounty Program: An Effective Repellent?

MIT isn’t the only big-name institution rolling out a bug bounty program. As noted by Tech Times, the U.S. Department of Defense is running their first-ever “Hack the Pentagon” campaign from April 18 to May 12. This program encourages white-hat hackers to break into specific systems in an effort to report on vulnerabilities. While hackers have to pass a background check and agree to follow the rules of the game — and can’t come from countries embargoed by the United States — there’s $150,000 up for grabs.

Then there’s the bug bounty design firm Bugcrowd, which creates bug-catching frameworks for other companies. As noted by eWEEK, Casey Ellis, the CEO of Bugcrowd, used to spend most of his time “explaining what a bug bounty was to people.” Today, the company has secured $15 million in Series B funding, which has allowed them to reach $24 million in total financing to date.

So what’s the bottom line? Hackers are looking for corporate bugs. If left alone, these bugs pose a serious risk. But if companies are willing to pay out — or offer meal tickets to hungry undergrads — there’s a huge market for finding and squashing these little critters before they see the light of day.

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today