Naked Security

We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you! Got questions/suggestions/stories to share? Email: tips@sophos.com Twitter: @NakedSecurity Instagram: @NakedSecurity

https://podcasters.spotify.com/pod/show/naked-security

subscribe
share






episode 19: S3 Ep19.5: How NOT to be a bug bounty hunter


In this special mini-episode, Paul Ducklin talks to Sophos cybersecurity expert Chester Wisniewski about bug bounty hunting.


How does bug bounty hunting work? What should you do if you get a bug report that doesn't follow established protocol? Chester tells you how to deal with so-called "beg bounties", where self-styled "experts" beg you for money or even threaten you with ill-defined "problems" they claim to have found.


https://news.sophos.com/en-us/have-a-domain-name-beg-bounty-hunters-may-be-on-their-way


https://nakedsecurity.sophos.com/beware-of-technical-experts-bombarding-you-with-bug-reports


Original music by Edith Mudge


Got questions/suggestions/stories to share?

Email tips@sophos.com

Twitter @NakedSecurity

Instagram @NakedSecurity


fyyd: Podcast Search Engine
share








 February 12, 2021  16m