Apple has launched a brand new security hub to help spot bugs and flaws

Apple Security Research looks to up the company’s security game

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Applehas unveiled anew security huband an upgraded bounty hunting program as it looks to improve the way it discovers, and remedies, different flaws and vulnerabilities in its ecosystem.

“Our groundbreaking security technologies protect the users of over 1.8 billion active devices around the world. Hear about the latest advances in Apple security from our engineering teams, send us your own research, and work directly with us to be recognized and rewarded for helping keep our users safe,” the new website reads.

The company’s bounty system has been upgraded, Apple said, claiming it improved its response time, and simplified issue reporting and communication.

Tracking progress

Tracking progress

“First, we’re responding much more quickly. At times we received many more submissions than we anticipated, so we’ve grown our team and worked hard to be able to complete an initial evaluation of nearly every report we receive within two weeks, and most within six days,” the companyexplained.

“Our Apple Security Research site includes a new way to send us research on the web and get real-time status updates. Just sign in with your Apple ID and follow the prompts to send us a detailed report. You can then track the progress of your report and communicate securely with Apple engineers as we investigate.”

Apple offers hackers free iPhones to hunt down iOS security bugs>Apple pushes out iOS 12.1.4 to fix Group FaceTime eavesdropping bug>Check out the best endpoint protection services around

The program will also be more transparent, Apple claims. The site includes detailed Apple Security Bounty information, as well as evaluation criteria. Bounty categories include ranges and examples, helping bounty hunters determine where they want to focus their research, and determine what kind of reward they can expect. “We’ve provided ranges for submissions that impact Apple services and infrastructure, as well as our products,” it explains.

More details on the bounty hunting program, the Security Research Device applications, which are now open, and additional knowledge blogs, can be found onthis link.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Via:9to5Mac

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

This new phishing strategy utilizes GitHub comments to distribute malware

Should your VPN always be on?

GoPro Max 2 hit by further delays – 2025 is the earliest we’ll see the 360-degree action cam