Canada markets open in 2 hours 17 minutes
  • S&P/TSX

    20,461.93
    +60.44 (+0.30%)
     
  • S&P 500

    4,448.98
    +53.34 (+1.21%)
     
  • DOW

    34,764.82
    +506.50 (+1.48%)
     
  • CAD/USD

    0.7877
    -0.0025 (-0.32%)
     
  • CRUDE OIL

    73.34
    +0.04 (+0.05%)
     
  • BTC-CAD

    52,607.25
    -3,133.43 (-5.62%)
     
  • CMC Crypto 200

    1,020.60
    -88.33 (-7.96%)
     
  • GOLD FUTURES

    1,757.10
    +7.30 (+0.42%)
     
  • RUSSELL 2000

    2,259.04
    +40.48 (+1.82%)
     
  • 10-Yr Bond

    1.4100
    0.0000 (0.00%)
     
  • NASDAQ futures

    15,230.75
    -72.75 (-0.48%)
     
  • VOLATILITY

    19.87
    -1.00 (-4.79%)
     
  • FTSE

    7,060.98
    -17.37 (-0.25%)
     
  • NIKKEI 225

    30,248.81
    +609.41 (+2.06%)
     
  • CAD/EUR

    0.6716
    -0.0011 (-0.16%)
     

MoD pays ‘ethical hackers’ to find flaws in bid to avoid cyber attacks

·2 min read

Hackers have been paid by the Ministry of Defence (MoD) to search their computer systems for vulnerabilities before they can be exploited by real cyber threats.

The department’s first bug bounty program saw 26 so-called “ethical hackers” invited to go under the bonnet of its networks for 30 days, in a bid to get ahead of bad actors and improve national security.

Bug bounty programs offer people a financial reward in exchange for reporting technical flaws.

It is a non-traditional approach for the MoD but common practice among the technology industry and has already been adopted by the US Department of Defence to great success.

The program is led by HackerOne, which carries out background checks on its community of hackers.

Christine Maxwell, the MoD’s chief information security officer, said the move was an “essential step in reducing cyber risk and improving resilience”.

“Working with the ethical hacking community allows us to build out our bench of tech talent and bring more diverse perspectives to protect and defend our assets,” she explained.

One participant, Trevor Shingles, said he was able to alert the MoD to a flaw he uncovered which would have allowed a bad actor to modify permissions and gain access.

“It’s been proven that a closed and secretive approach to security doesn’t work well,” he said.

“For the MoD to be as open as it has with providing authorised access to their systems is a real testament that they are embracing all the tools at their disposal to really harden and secure their applications.

“This is a great example to set for not only the UK, but for other countries to benchmark their own security practices against.”

Our goal is to create a safe and engaging place for users to connect over interests and passions. In order to improve our community experience, we are temporarily suspending article commenting