{"id":365,"date":"2022-11-30T18:37:43","date_gmt":"2022-11-30T18:37:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ltupa000\/?p=365"},"modified":"2022-11-30T18:37:46","modified_gmt":"2022-11-30T18:37:46","slug":"getting-paid-to-hunt-bugs","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ltupa000\/2022\/11\/30\/getting-paid-to-hunt-bugs\/","title":{"rendered":"Getting paid to hunt bugs?"},"content":{"rendered":"\n<p>A bug bounty is a program hosted by various companies to locate vulnerabilities affecting the software and end user. The &#8220;bugs&#8221; varies from different levels. For example, some bugs can have a high vulnerability risk, whereas a minor bug only affects the content display. Therefore, a bug bounty is less expensive than a lawsuit and data breach. Nevertheless, addressing bugs is vital because they could bring a downfall to a company. Therefore, companies should invest in bug bounties because multiple brains are better than one. For example, the bug can be on the end user, and companies would be responsible if a bug exploits the consumer&#8217;s device. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Source<\/h2>\n\n\n\n<p><a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A bug bounty is a program hosted by various companies to locate vulnerabilities affecting the software and end user. The &#8220;bugs&#8221; varies from different levels. For example, some bugs can have a high vulnerability risk, whereas a minor bug only affects the content display. Therefore, a bug bounty is less expensive than a lawsuit and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ltupa000\/2022\/11\/30\/getting-paid-to-hunt-bugs\/\">Read More<\/a><\/div>\n","protected":false},"author":20587,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[6,5],"tags":[8,4,7],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ltupa000\/wp-json\/wp\/v2\/posts\/365"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ltupa000\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ltupa000\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ltupa000\/wp-json\/wp\/v2\/users\/20587"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ltupa000\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/ltupa000\/wp-json\/wp\/v2\/posts\/365\/revisions"}],"predecessor-version":[{"id":369,"href":"https:\/\/sites.wp.odu.edu\/ltupa000\/wp-json\/wp\/v2\/posts\/365\/revisions\/369"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ltupa000\/wp-json\/wp\/v2\/media?parent=365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ltupa000\/wp-json\/wp\/v2\/categories?post=365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ltupa000\/wp-json\/wp\/v2\/tags?post=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}