• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • March 6th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Hacking News

DoD’s Largest Bug Bounty Program “Hack the Air Force” Launched

April 27th, 2017 Waqas Security, Hacking News 0 comments
DoD’s Largest Bug Bounty Program “Hack the Air Force” Launched
Share on FacebookShare on Twitter

The US department of Defence (DoD) has launched “Hack the Air Force” bug bounty program encouraging IT security researchers and hackers to hack the United Airforce for good and make some big cash.

The initiative was announced yesterday by cyber security specialist of the US Air Force through Facebook Live video session while the program itself has been launched on HackerOne, a bug bounty and vulnerability coordination platform that connects businesses with cybersecurity researchers.

Do you have what it takes to #HacktheAirForce? Watch the live discussion w/ @Hacker0x01 & @DefenseDigital now on https://t.co/iNsyZYMR9Q https://t.co/hPGyb5xBEZ

— Gen. Dave Goldfein (@GenDaveGoldfein) April 26, 2017

DoD is calling it “The Largest DoD bug bounty challenge ever” since it also allows hackers not only from the United States but also from Australia, Canada, New Zealand and the United Kingdom to participate in the program.  It must be noted that all these five countries are part of the “The Five Eyes” (FVEY) intelligence alliance. However, as one can understand the sensitivity of the program the department is only allowing vetted researchers and hackers to participate in the challenge. government and military workers are also allowed to participate but no reward will be offered to them.

Air Force Chief Information Security Officer Peter Kim said that “We have millions of probes a day, a week, on our DoD systems quite frankly. These are probably people out there, around the world, who particularly aren’t friendly with the Department of Defense. And they don’t tell us what’s wrong with our systems until we find out that something’s been hacked. And so I want to turn that around. I want to know beforehand where our vulnerabilities are. I know we have vulnerabilities, and I want to know where those are in the United States Air Force.”

“This is the first time the AF has opened up our networks to such a broad scrutiny. “We have malicious hackers trying to get into our systems every day. It will be nice to have friendly hackers taking a shot and, most importantly, showing us how to improve our cyber security and defense posture. The additional participation from our partner nations greatly widens the variety of experience available to find additional unique vulnerabilities,” Kim added.

If you are a hacker or security researcher based in the “The Five Eyes” countries the registration date for “Hack the Air Force” bug bounty program opens on May 15th while the contest begins on May 30th and ends on June 23rd.

It was just last year when the US Department of Defense launched its first ever Hack the Army program which was a massive success with awards up to $100,000 was distributed among researchers. Similarly, Hack the Pentagon initiative also showed success and assisted the authorities in fixing critical bugs in their cyber infrastructure.

If you are a hacker you can either take part in the US Air Force bug bounty program or check our previous articles guiding hackers to which bug bounty program they can take advantage of.

[fullsquaread][/fullsquaread]


DDoS attacks are increasing, calculate the cost and probability of a DDoS attack on your business with this DDoS Downtime Cost Calculator.

  • Tags
  • Bug Bounty
  • DDOS
  • hackers
  • hacking
  • internet
  • Military
  • security
  • USA
Facebook Twitter LinkedIn Pinterest
Previous article A Look at the 4 Main Functionalities of NetSuite
Next article Vulnerability in Portrait Display service; millions of IoT devices affected
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Microsoft, FireEye report 3 new malware linked to SolarWinds hackers

Microsoft, FireEye report 3 new malware linked to SolarWinds hackers

Threat actors hijacking Bitbucket and Docker Hub for Monero mining

Threat actors hijacking Bitbucket and Docker Hub for Monero mining

Top Russian hacker forums Maza, Verified hacked; data leaked online

Top Russian hacker forums Maza, Verified hacked; data leaked online

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Microsoft, FireEye report 3 new malware linked to SolarWinds hackers
Cyber Attacks

Microsoft, FireEye report 3 new malware linked to SolarWinds hackers

Threat actors hijacking Bitbucket and Docker Hub for Monero mining
Security

Threat actors hijacking Bitbucket and Docker Hub for Monero mining

Top Russian hacker forums Maza, Verified hacked; data leaked online
Hacking News

Top Russian hacker forums Maza, Verified hacked; data leaked online

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us