In early September, security researcher Denis Tokarev wrote a blog post in which he complained about some interactions with Apple's bug bounty program. The incident originated from four security vulnerabilities submitted to Apple through the Bug Nounty Program. However, after waiting for a long time, he found that only one had been fixed. The latest news is that Apple has responded to the matter, claiming that it is "still investigating" the relevant issues.
Tokarev told Motherboard that three other vulnerabilities were not fixed in the earlier iOS 15 update. Now, Apple has apologized for the delay in communication and added that the company is investigating the issues.
However, aside from the three buildings that Apple is still fixing, Tokarev said he was not credited for reporting the fixed vulnerability.
Finally, despite Apple's claim that its bug bounty program has been "hugely successful," at least one cybersecurity expert told Motherboard that Apple's handling of this situation is somewhat unusual. Another said that it wasn't until the media exposed the loopholes in the repair department that Apple took the time to respond to Tokarev's questions. |
>>: WeChat iOS version updated! Voice calls can display the other party's Moments updates
The statistics platform GlobalData released its l...
The May Day holiday is coming to an end in the bl...
Fission is a standard feature for user growth and...
Author: ACC Psychology Popular Science Author Rev...
I was originally planning to continue writing my ...
Audit expert: Zhou Hongzhi Senior Experimentalist...
Through the search term report, we can see whethe...
A drop of water can reveal the vast ocean. Only b...
Hello, this is Science Popularization China. Toda...
Wuhan Tea Tasting Contact Information I strongly ...
What is the price of being an agent of Hohhot Foo...
The number of monthly active users of Douyin worl...
NBA basketball teaching_professional basketball t...
1. Incorporate other people’s perspectives High-q...
The annual consumer protection "Spring Festi...