Menu
LinkedIn says private bug bounty program works for it better

LinkedIn says private bug bounty program works for it better

Vetting researchers prior to submitting bugs means getting higher quality reports, LinkedIn said

LinkedIn says it will keep its bug bounty program private, saying it cuts down on erroneous reports.

LinkedIn says it will keep its bug bounty program private, saying it cuts down on erroneous reports.

LinkedIn plans to continue closely vetting researchers for its bug bounty rewards program, saying it reduces the number of distracting erroneous and irrelevant reports.

The decision to keep its program private "gives our strong internal application security team the ability to focus on securing the next generation of LinkedIn's products while interacting with a small, qualified community of external researchers," wrote Cory Scott, LinkedIn's director of information security, in a blog post.

Security researchers with vetted backgrounds are invited to participate, which allow them to have the same experience as if they were on LinkedIn's internal security team, Scott wrote.

Many large technology companies such as Google, Yahoo and Facebook have public bug bounty programs, which pay rewards for valid security vulnerabilities usually based on their severity.

Scott wrote that the vast majority of bugs reported to LinkedIn from the general public "were not actionable or meaningful." The private program, launched last October, "has a signal-to-noise ratio of 7:3, which significantly exceeds the public ratios of popular public bug bounty programs."

The professional networking site will still review bugs submitted through its catch-all security email address, security@linkedin.com, he wrote.

LinkedIn uses HackerOne for its bug program, which is a company that has a secure platform that manages security vulnerability information and handles disclosure information and rewards. LinkedIn has paid out US$65,000 since the program launched, Scott wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securityLinkedInExploits / vulnerabilities

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments