{"id":12361,"date":"2017-07-02T19:00:38","date_gmt":"2017-07-03T00:00:38","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=12361"},"modified":"2017-07-03T16:29:50","modified_gmt":"2017-07-03T21:29:50","slug":"companies-governments-find-best-hackers","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/companies-governments-find-best-hackers\/","title":{"rendered":"How Do Companies and Governments Find the Best Hackers?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Big name companies like Facebook, Apple, and Microsoft have all hired hackers \u2014 after those same individuals got caught hacking someone else! While this practice has become normalized, that doesn\u2019t mean that the rest of the country wants hackers to gain access to their devices to point out poor cybersecurity behaviors. If you want to quickly improve your cyber awareness, be sure to regularly scan your device for security threats. Click here to run a quick Security Scan on your phone:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-9829\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9829\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg\" alt=\"run-security-scan\" width=\"300\" height=\"67\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><span style=\"font-weight: 400;\">This recruitment technique might seem like a risky one, but it actually comes with a distinct advantage. For instance, say you hear about a hacker who successfully breached Twitter&#8217;s security system, like 17-year-old Michael Mooney did in 2009. That person has shown a more impressive display of his hacking skills than a resume ever could.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/protect-twitter-account-hackers\/\"><b>How to Protect Your Twitter Account From Hackers<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">In Michael Mooney&#8217;s case, he created two worms that infected more than 200 Twitter accounts, plus produced another 10,000 spam tweets. What was his punishment for these wrongdoings? Well, Mooney got offered a job at exqSoft Solutions, a web development company. Of course, hacking is still illegal in the United States and this criminal behavior can&#8217;t be endorsed. But this discussion does bring us to the topic of ethical hackers and how companies, governments, and other institutions are hiring them for &#8220;bug bounties.\u201d Keep reading below to find out more about this increasingly common practice.<\/span><\/p>\n<p><b>Ethical Hackers and Their Bug Bounties<\/b><\/p>\n<p><span style=\"font-weight: 400;\">You&#8217;ve probably heard of &#8220;black hat&#8221; hackers before. They&#8217;re the hackers who infiltrate security systems and databases for malicious purposes. But what about &#8220;white hat&#8221; hackers? Also known as &#8220;ethical hackers,\u201d white hats are hired by companies and governments, under the request that they attempt a data breach on their security systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the hacker is successful at finding a flaw in their system, they are rewarded with a so-called &#8220;bug bounty.\u201d These sums of cash can be pretty lucrative, too, depending on who&#8217;s writing the check. Indeed, back in 2015, Apple offered a bug bounty of $1 million to anyone who could infiltrate their mobile operating system. Pretty decent payday, right? In these cases, white hat hackers often work together in small clusters, making them not so different from an office&#8217;s IT team.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After all, it&#8217;s a common misconception that all hackers have criminal intentions. Many are IT security experts, who relish the challenge of trying to crack into a company&#8217;s security system. These days, companies and governments are encouraged to hire ethical hackers, since data breaches can costs them thousands of dollars in losses. So, in the long run, paying an ethical hacker saves them money.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Surprisingly enough, many hackers get solicited for legitimate jobs after they\u2019ve successfully breached a major corporation&#8217;s security system.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[6,5],"tags":[942,252,306,195,309,9,4460,249,243,161],"class_list":["post-12361","post","type-post","status-publish","format-standard","hentry","category-privacy","category-security","tag-app0","tag-app1","tag-app4","tag-app5","tag-app7","tag-mobile","tag-news","tag-security","tag-technology","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=12361"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12361\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=12361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=12361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=12361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}