![Naked Security Podcast artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts123/v4/78/f5/64/78f56461-6320-c8ad-cfcc-9bac3352f6ad/mza_4868739643986713073.jpg/100x100bb.jpg)
S3 Ep19.5: How NOT to be a bug bounty hunter
Naked Security Podcast
English - February 12, 2021 13:42 - 16 minutes - 22.9 MB - ★★★★★ - 40 ratingsTechnology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
In this special mini-episode, Paul Ducklin talks to Sophos cybersecurity expert Chester Wisniewski about bug bounty hunting.
How does bug bounty hunting work? What should you do if you get a bug report that doesn't follow established protocol? Chester tells you how to deal with so-called "beg bounties", where self-styled "experts" beg you for money or even threaten you with ill-defined "problems" they claim to have found.
https://news.sophos.com/have-a-domain-name-beg-bounty-hunters-may-be-on-their-way
https://nakedsecurity.sophos.com/beware-of-technical-experts-bombarding-you-with-bug-reports
Original music by Edith Mudge (https://www.edithmudge.com)
Got questions/suggestions/stories to share?
Email: [email protected]
Twitter: NakedSecurity (https://twitter.com/nakedsecurity)
Instagram: NakedSecurity (https://instagram.com/nakedsecurity)