Tuesday, May 7, 2024
Home Hacking News Hacking challenge at Pentagon | Participants get Cash Prize

Hacking challenge at Pentagon | Participants get Cash Prize

Pentagon research agency that developed the internet and GPS which calls the hacking group to participate to find the flaw in the new mega secure hardware.

According to the source it was mentioned that those ethical hackers who can find the vulnerabilities in the new mega source hardware then the defense advanced projects agency (DARPA) will reward with more than just a deep sense of satisfaction. As they say, every flaw can be the chance for the winner to get the cash prize,

On July the bug bounty contest is going to be held and the main reason behind is to check and find the new flaw on the new secure hardware such as computer, chips, and circuits which make it more secure. It was also designed in different ways so that the hacker can rely on being able to undermine the software to gain the unauthorization access to systems and devices will find their attempts stymied.

If this program gets successful then it gets widely adopted. The approach could see the release of the endless software updates to patch the vulnerabilities by threat actors and where they finally draw to close.

DARPA microsystem technology office program manager Keith Rebello mentioned in his comment “ The new hardware could be free from the malicious hackers and gave the legitimate organizations the edge whenever it comes to cybersecurity.

According to the team overall there are 70 percent of the hacking executed due to the hardware vulnerabilities if they know how to fix this then it will be easier to take down a mass hackers on the ground,

The new program executed in 2017 and it was officially called System security integration through the hardware and Firmware or SSITH.DARPA has funded the hardware but the construction is completed and constructed by the researcher and academic. The place called as Massachusetts Institute of technology and the University of Michigan and Lockheed Martin

SSITH will continue for the one or more years which allow vulnerabilities to detected and fixed

 

if any issues related to the article. Drop your suggestions in the comment box.
Contact at info page: Source

Our new page Source

Bipin Choudharyhttps://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...

Recent Comments