Intel has expanded its $100,000 bug bounty application in an work to entice “elite hackers” to report vulnerabilities in the company’s firmware, hypervisors, graphics processing models (GPUs), and chipsets.
Of the 113 exterior vulnerabilities detected in 2021, 97 ended up documented to Intel by means of its general public bug bounty software.
Dubbed Job Circuit Breaker, the expansion to Intel’s current program will see the creation of an integrated community that will provide specific instruction, hacking problems, and opportunities to investigate new and pre-launch items, in addition to improved collaborations with hardware and program engineering teams at Intel.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
“Challenge Circuit Breaker broadens and deepens Intel’s current open up Bug Bounty system by hosting targeted time-boxed activities on distinct new platforms and systems, delivering coaching and generating alternatives for far more hands-on collaboration with Intel engineers,” stated Intel.
“Project Circuit Breaker’s first function, Camping with Tigers, is now underway with a group of 20 scientists who obtained systems with Intel Core i7 processors (previously Tiger Lake).”
In the unique Camping with Tigers celebration, scientists will look for security vulnerabilities in Intel’s Tiger Lake system. The plan commenced in December 2021 and will be in outcome until May well 2022. At three milestones, suitable vulnerabilities will earn bounty multipliers.
Prospective results could involve, among the others, micro-architectural and firmware vulnerabilities. This addresses flaws related to BIOS, IP firmware components, embedded controller, sensor, reliable system module, and flash storage.
“We commit in and host bug bounty packages mainly because they entice new views on how to problem emerging security threats – and Job Circuit Breaker is the upcoming step in collaborating with researchers to fortify the industry’s security assurance procedures, in particular when it comes to hardware, claimed Katie Noble, director of Intel’s solution security incident reaction group (PSIRT) and bug bounty.
“We seem ahead to seeing how the method will evolve and to introducing new voices to the meaningful get the job done that we do,” extra Noble.
Some sections of this post are sourced from:
www.itpro.co.uk