123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Facebook Alters Bug Disclosure Policy To Encourage Information Security Experts

Profile Picture
By Author: petermartin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Security has become the buzzword in the IT industry. Rising number of security breaches has been a cause for concern for organizations, software developers, websites and vendors of security products. While hackers constantly endeavor to exploit vulnerabilities, software developers have to invest considerable resources on other factors such as product innovation, research and marketing along with security. Off late, information security researchers have been discovering bugs in software products, web applications and security products to aid developers in coming up with appropriate security patches. Recently, popular social networking site, Facebook modified its bug disclosure policy to encourage information security researchers to discover vulnerabilities. The wording of the earlier policy gave an impression that information provided by security professionals may be used to take action against them. The wrong wording of the policy scared many researchers from informing vulnerabilities to Facebook. Some of the prominent vendors such as Google and Mozilla ...
... offer financial rewards to security professionals for revealing high and critical vulnerabilities.

Usually, organizations use the services of certified ethical hackers to reveal the vulnerabilities. The new disclosure policy clarifies that no legal action will be initiated against researchers for sharing vulnerabilities, if the action was done in good faith and Facebook receives reasonable time to respond. The clarification will inspire security professionals to help Facebook pre-empt hackers in discovering vulnerabilities and initiating corrective action. The popularity of Facebook has made it an easy target for hackers to uncover loads of personal information to thousands of individuals. Social networking sites such as Facebook and Twitter witness several instances of fake accounts from offenders in the name of celebrities and top officials. Therefore, security is one of the prime concerns for these sites.

Hackers can misuse the vulnerabilities on websites to inject malware, redirect to fake websites, create fake accounts, reveal username and passwords, and gain unauthorized access to associated databases. Organizations must encourage their employees to enroll in IT security courses to keep themselves updated on the latest tools and techniques. Internet users must vary of fake e-mails purportedly coming from a legitimate networking site with invitation from unknown members. The links in the e-mail may lead users to fake websites, where there information may be compromised.

Total Views: 274Word Count: 368See All articles From Author

Add Comment

Computers Articles

1. Nfc Qr Guard Tour Patrol System
Author: jamesGPS NFC Scanning Guard Tour Patrol System is

2. Essae Pos 615: The Trusted Pos Solution In Hyderabad
Author: prime pos

3. Transforming Business Efficiency With Aits Software: A Comprehensive Erp Business Solution
Author: AITS Software

4. 7 Best App Development Strategies To Boost Your App’s Success
Author: AGTC

5. Gcc High: Pricing, Benefits, And Compliance – Everything You Need To Know
Author: ECF Data

6. Vexma Cloud: Smart Manufacturing For Effortless Control
Author: Vexmacloud

7. Leadera Digital Agency: The Leading Google Ads Agency In India
Author: Leadera

8. Powerful Stats On Voice Of Customer Analytics For Brands
Author: DataZivot

9. Top Touchscreen Dealers In Hyderabad: Quality, Service, And Reviews
Author: prime pos

10. Affordable & Flexible Laptop Rentals In Delhi –
Author: rentalplaza

11. Data-driven Approaches To Keep Students On Track For Success
Author: Brenda Joyce

12. How Student Lifecycle Management Improves Student Success And Retention
Author: Brenda Joyce

13. Clinical Trial Technology And Complexity In The Real World – Why You Need A Flexible Edc System
Author: Giselle Bates

14. 11 Software Outsourcing Challenges And How To Overcome Them?
Author: goodcoders

15. How To Build Your Business With Youtube?
Author: goodcoders

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: