Apple finally introduces bug bounty programme

Company will offer a maximum reward of $200,000 for flaws in its security

Bug bounty

Apple has finally announced the creation of a bug bounty programme, in order to let external researchers patch up any holes in its security. 

The company will pay security experts up to $200,000 (153,400) for flaws in its secure boot firmware, up to $100,000 for flaws exfiltrating confidential data from the secure enclave processor, and up to $50,000 for flaws executing arbitrary code with kernel privileges on iOS.

Additionally, Apple will offer a maximum of $25,000 to anyone that can get at user data within a sandboxed process, and a prize of up to $50,000 for anyone that can get into iCloud account information from its servers.

The news was announced at the annual Black Hat security conference by Ivan Krsti, Apple's head of security engineering and architecture. "We've had great help from researchers like you and the security mechanisms we build have gotten stronger," he said.

"The feedback that we've heard pretty consistently both from my red team and Apple and also directly is that it's getting more difficult to find some of the most critical types of security vulnerabilities."

The programme will be invitation-only at first, and will start off with a "few dozen" researchers. Krsti also added that if a researcher donates their bounty to charity, Apple will match the amount.

Bug bounty programmes, where companies pay hackers in exchange for telling them about any vulnerabilities they find in their software, are a staple of the security industry. Companies like Google, Microsoft, Uber, and even PornHub all use bug bounties as a way of encouraging hackers to discreetly report flaws rather than exploit them.

Despite being one the largest companies in the tech industry, Apple has waited longer than most of its competition to implement a bounty programme. The company has come in hard though, and its bounties are among the most generous offered by a major corporation.

Apple has not made public why it is finally opening up a bug bounty programme after so long, but it may have something to do with its spat with the US government earlier this year.

The FBI was attempting to force Apple to break its own encryption, but backed down after a third-party company did it for them. Apple consequently opened up its early iOS 10 code to developers, leaving it unencrypted, meaning developers could spot flaws and offer patches.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

SolarWinds hackers hit Malwarebytes through Microsoft exploit
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021
FBI warns of ongoing corporate vishing attacks
phishing

FBI warns of ongoing corporate vishing attacks

19 Jan 2021
How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

15 Jan 2021
Hackers using COVID vaccine as a lure to spread malware
hacking

Hackers using COVID vaccine as a lure to spread malware

15 Jan 2021

Most Popular

IT retailer faces €10.4m GDPR fine for employee surveillance
General Data Protection Regulation (GDPR)

IT retailer faces €10.4m GDPR fine for employee surveillance

18 Jan 2021
Citrix buys Slack competitor Wrike in record $2.25bn deal
collaboration

Citrix buys Slack competitor Wrike in record $2.25bn deal

19 Jan 2021
Should IT departments call time on WhatsApp?
communications

Should IT departments call time on WhatsApp?

15 Jan 2021