Microsoft opens its own website for hackers

Microsoft often hired hackers to search for security flaws or unlock security mechanisms built into its software with the goal of making products more secure.

This is a fact almost everyone knows but Microsoft has never officially published this information.

Microsoft opens its own website for hackers Picture 1 The situation has officially changed after the world's No. 1 software company announced the opening of a website called " Hackers @ Microsoft " exclusively for its hackers.

The information posted on the website confirms: 'Microsoft hired white-hat hackers to work for the company and now wants to publicize the identities of these hackers and the work and what they have done.' .

Hoang Dung

4.5 ★ | 2 Vote

May be interested

  • IDS for Web application attacksPhoto of IDS for Web application attacks
    in the online world, there is always a world of web application hacking that can be viewed as a wild world. there are many new and always happening things that are not as expected. these attacks often exploit vulnerabilities in web applications or h & oa code techniques
  • Analysis of an attack (Part 1)Photo of Analysis of an attack (Part 1)
    this series will be based on a network vulnerability. what will be introduced in this article is a real attack, starting from exploring to listing, exploiting network services, and ending exploitation strategies for sending notifications. all of these steps will be observed at the packet level, and then explained in detail.
  • Analysis of an attack (Part 2)Photo of Analysis of an attack (Part 2)
    we have already introduced you in a section of observable information while opening the package string sent by nmap. the sent string starts with an icmp echo response to determine if the computer or network has been assigned to the ip address. add v & agr
  • Goolag 'guide' hacking through GooglePhoto of Goolag 'guide' hacking through Google
    an open-source tool that scans for website security errors by exploiting google's search function has been released by the hacker group 'the cult of the dead cow' called goolag.
  • Analysis of an attack (Part 3)Photo of Analysis of an attack (Part 3)
    in part 2 of this series, we have left all the necessary information required for an attack on the victim network. with that note, let's continue with a real attack. this attack follows the transmission of ecommerce
  • Hacker attacks from the network to your computerPhoto of Hacker attacks from the network to your computer
    nowadays, there has been an attack on the computer of people who are accessing the internet. these hackers use some software to search (scan) all computers online