InvestSMART

$20,000 bug

A British security researcher received a $20,000 reward from Facebook after uncovering a security bug that allowed him to take over someone else's Facebook account.
By · 2 Jul 2013
By ·
2 Jul 2013
comments Comments
A British security researcher received a $20,000 reward from Facebook after uncovering a security bug that allowed him to take over someone else’s Facebook account. Jack Whitton found the exploit allowed him to reset a user’s password via text message and could have compromised millions of profiles. http://bit.ly/1cFqXwp
Google News
Follow us on Google News
Go to Google News, then click "Follow" button to add us.
Share this article and show your support
Free Membership
Free Membership
InvestSMART
InvestSMART
Keep on reading more articles from InvestSMART. See more articles
Join the conversation
Join the conversation...
There are comments posted so far. Join the conversation, please login or Sign up.

Frequently Asked Questions about this Article…

A British security researcher, Jack Whitton, uncovered a Facebook security bug that allowed him to take over someone else’s account by resetting a user’s password via text message. Facebook rewarded him $20,000 for reporting the issue.

Jack Whitton is a British security researcher who found an exploit in Facebook’s systems that enabled password resets via text message, a flaw that could be used to take over accounts.

According to the report, the exploit allowed an attacker to reset a user’s password using text message verification, and the vulnerability could have compromised millions of Facebook profiles.

Facebook rewarded the researcher $20,000 after he reported the vulnerability — indicating the company acknowledged the issue and paid a bounty for the disclosure.

In this instance, Facebook paid $20,000 to a researcher who responsibly disclosed a security flaw. Such payments reward individuals who find and report vulnerabilities so companies can fix them before they are abused.

Security flaws can affect user trust and a company’s reputation, so investors often watch such incidents. This article reports a serious exploit that could have affected millions, and that context may be relevant when assessing company risk.

Yes — the reported exploit enabled password resets via text message, which could let an attacker take over accounts. The article notes the flaw could have compromised millions of profiles, making it a potentially serious security issue.

The article summarizes that Jack Whitton found the exploit and Facebook paid a $20,000 reward; you can follow the original news link cited in the report for more details.