{"id":8252,"date":"2015-09-21T19:33:50","date_gmt":"2015-09-22T00:33:50","guid":{"rendered":"http:\/\/hcstx.org\/?p=8252"},"modified":"2015-09-21T19:33:50","modified_gmt":"2015-09-22T00:33:50","slug":"spy-agency-contractor-puts-out-a-1m-bounty-for-an-iphone-hack","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/09\/21\/spy-agency-contractor-puts-out-a-1m-bounty-for-an-iphone-hack\/","title":{"rendered":"Spy Agency Contractor Puts Out a $1M Bounty for an iPhone Hack"},"content":{"rendered":"<p><a href=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/09\/iphone.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-8253\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/09\/iphone.jpg\" alt=\"iphone\" width=\"582\" height=\"388\" \/><\/a><\/p>\n<p><span class=\"lede\">AS LONG AS <\/span>hackers have sold their secret hacking techniques known as zero-day exploits to government spies, they\u2019ve generally kept that trade in the shadows. Today it\u2019s come into the spotlight with the biggest bounty ever publicly offered for a single such exploit: $1 million for a technique that can break into an iPhone or iPad running Apple\u2019s freshly released iOS 9.<\/p>\n<p>On Monday, a new security industry firm known as Zerodium announced that it will pay that seven-figure sum to anyone who gives the company a hacking technique that can take over an iOS device remotely, via a web page the victim visits, a vulnerable app on the victim\u2019s device, or by text message. The company says it\u2019s willing to pay the bounty multiple times, though it may cap the payouts at $3 million.<\/p>\n<p>\u201cDue to the increasing number of security improvements and the effectiveness of exploit mitigations in place, Apple\u2019s iOS is currently the most secure mobile OS,\u201d reads the<a href=\"https:\/\/www.zerodium.com\/ios9.html\">statement on Zerodium\u2019s website announcing the bounty<\/a>. \u201cBut don\u2019t be fooled, secure does not mean unbreakable, it just means that iOS has currently the highest cost and complexity of vulnerability exploitation and here\u2019s where the Million Dollar iOS 9 Bug Bounty comes into play.\u201d<\/p>\n<p>Read the Remainder at<strong><a href=\"http:\/\/www.wired.com\/2015\/09\/spy-agency-contractor-puts-1m-bounty-iphone-hack\/?mbid=nl_92115\"> Wired<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AS LONG AS hackers have sold their secret hacking techniques known as zero-day exploits to government spies, they\u2019ve generally kept that trade in the shadows. Today it\u2019s come into the spotlight with the biggest bounty ever publicly offered for a single such exploit: $1 million for a technique that can break into an iPhone or&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2122,13,74,1317,1189,65],"tags":[2238,2239,1805,2240],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/8252"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=8252"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/8252\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=8252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=8252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=8252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}