United Airlines will reward hackers with air miles

Bug bounty programme is first of its kind for US airline industry

United Airlines has set up a bug bounty programme, which rewards hackers with air miles, in a bid to beef up its cyber security standing.

With traditional bug bounty programmes, when hackers or researchers find a flaw, rather than exploiting it, they receive a monetary reward for reporting it.

United Airlines has opted for a different route. Instead of money, the firm is paying out air miles for bug reports. It is believed to be the first ever airline in the US to do so.

Advertisement - Article continues below

So far, the company confirms, two awards have been paid out, both to a total of one million miles each. At the time of writing, that equates to 16 round-trip economy tickets from Europe to the US, with change left over.

The US airline has been hit by a series of high-profile cyber gaffes over the past few months, including one instance of a security expert claiming to have hacked into his plane's avionics through the in-flight entertainment, and two separate occasions where technical faults grounded United Airlines planes nationwide.

However, the bounty programme comes with certain restrictions. "Onboard Wi-Fi, entertainment systems or avionics", for example, are all off-limits. This is to do with safety concerns, as unauthorised access to critical flight systems could prove hugely dangerous.

Advertisement
Advertisement - Article continues below

The terms of the agreement also prevent disclosure of the bug, as well as exploiting it at any point.

Bug bounties are a common practice among tech-savvy start-ups, but have yet to see widespread adoption outside of the world of IT. If United Airlines proves successful with its programme, this could signal the start of a new wave of bounty-hunting.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/business/business-strategy/356296/non-voyage-coronavirus-brexit-and-the-future-of-business-travel
Business strategy

Non voyage: Coronavirus, Brexit and the future of business travel

1 Jul 2020
Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/policy-legislation/data-protection/356344/eu-institutions-warned-against-purchasing-any-further
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020
Visit/mobile/mobile-phones/356335/the-man-has-ruined-my-huawei-p40
Mobile Phones

The Man has ruined my Huawei P40

3 Jul 2020