{"id":6352,"date":"2019-10-17T11:32:36","date_gmt":"2019-10-17T15:32:36","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/?p=6352"},"modified":"2019-10-17T11:33:30","modified_gmt":"2019-10-17T15:33:30","slug":"hack-the-army-bug-bounty-challenge","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/2019\/10\/17\/hack-the-army-bug-bounty-challenge\/","title":{"rendered":"Hack the Army\u2019 Bug Bounty Challenge"},"content":{"rendered":"<p>I posted earlier this month How the US Air Force at this year\u2019s Defcon conference brought along an F-15 fighter jet data system to be evaluated for vulnerabilities. The US Air Force is changing the way it looks at cybersecurity and is embracing external cybersecurity experts to assist in securing military technology. They also agreed to allow a number of researches to attempt to hijack an orbiting satellite. <a href=\"https:\/\/www.wired.com\/story\/air-force-defcon-satellite-hacking\/\">https:\/\/www.wired.com\/story\/air-force-defcon-satellite-hacking\/<\/a><\/p>\n<p>Well, another branch of the US Military is changing its way of working in a silo and embracing external input. The Department of Defense (DoD) , the Defense Digital Service (DDS), and HackerOne are launching the second Hack the Army bug bounty challenge. The bug bounty challenge allows external hackers to attack 60 plus public web assets to determine if vulnerabilities exist and improve the DoD\u2019s cyber defenses. Hackers participating in the bug bounty challenge are individuals invited by HackerOne and active U.S. military members and government civilians.<\/p>\n<p>From the article, \u201cIt is our duty to ensure our citizens are protected from cyber threats, and finding new and innovative ways to do so is vital,\u201d said Romero. \u201cOur adversaries are determined and creative, so we must be every bit more of both. This latest HackerOne Challenge allows us to continue to harden the Army\u2019s attack surfaces with the talent and diverse perspectives of HackerOne\u2019s vetted hacker community.\u201d<\/p>\n<p><a href=\"https:\/\/www.meritalk.com\/articles\/second-hack-the-army-bug-bounty-challenge-underway\/\">https:\/\/www.meritalk.com\/articles\/second-hack-the-army-bug-bounty-challenge-underway\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I posted earlier this month How the US Air Force at this year\u2019s Defcon conference brought along an F-15 fighter jet data system to be evaluated for vulnerabilities. The US Air Force is changing the way it looks at cybersecurity and is embracing external cybersecurity experts to assist in securing military technology. They also agreed [&hellip;]<\/p>\n","protected":false},"author":14230,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[805801],"tags":[],"class_list":{"0":"post-6352","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-08-social-engineering-encoding-and-encryption","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/users\/14230"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/comments?post=6352"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6352\/revisions"}],"predecessor-version":[{"id":6353,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6352\/revisions\/6353"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/media?parent=6352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/categories?post=6352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/tags?post=6352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}