April 27, 2015 By Shane Schick 2 min read

Keeping on top of all the possible security flaws in the world’s most popular Web browser may be too much for any single organization, which is why the Microsoft bug bounty program for Project Spartan will grant researchers rewards as high as $15,000 for finding flaws.

In a blog post, the Washington-based software giant challenged white-hat hackers and other security experts to send a vulnerability report detailing functioning flaws between now and June 22. Of course, most of the findings in the Microsoft bug bounty program are expected to be minor and will likely earn payouts in the $500 to $6,000 range.

As Computerworld noted, the upper end of the financial incentive to better secure Project Spartan is 36 percent higher than the Microsoft bug bounty program for Internet Explorer 11. The official name of Project Spartan will likely be revealed during the company’s upcoming Build conference, and the browser could launch by the early summer.

However, Project Spartan isn’t Microsoft’s only bounty program open to security experts. VentureBeat reported that the company has created similar initiatives to protect a range of its other projects, most notably its cloud computing service, Azure, and the upcoming Office Sway. These vulnerability assessments are highly valuable to the company since they provide a way to outsmart cybercriminals before they strike.

Of course, Project Spartan will be a big part of Microsoft’s overall portfolio surrounding Windows 10, its core platform that will also come out later this year. BetaNews observed that the company has already been looking for feedback about any potential flaws within the operating system’s recently released technical preview.

Even in the past few months, there have been examples of security researchers helping companies such as eBay fend off potential flaws through programs similar to Microsoft’s. On the other hand, a recent study suggests the company may want to focus on other tactics.

A story on The Register profiled a presentation from the RSA Conference in which researchers from the Massachusetts Institute of Technology and an organization called HackerOne analyzed the bug bounty program for Internet Explorer 11. They concluded that offering more money doesn’t necessarily mean that more flaws will be discovered or that bigger bugs won’t be found in later versions of the software.

Given how widely Windows 10 and Project Spartan may be adopted, it’s still a good idea that Microsoft is encouraging the security community to work together on protecting its software. Hopefully, the Microsoft bug bounty program is just the first phase of an industry-wide effort to provide a more long-term, trustworthy computing experience.

Image Source: iStock

More from

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today