Intel opens bug hunt to all security researchers, offers possible $250K payout

Want to make a quick $250,000? Who doesn’t, right? If you have the know-how to hunt down vulnerabilities in hardware and software, then that high-dollar reward could be within your grasp. Intel is now offering an updated bug bounty program until December 31, 2018, setting that nice little chunk of change as the maximum payout for hunting down “side-channel vulnerabilities.” These vulnerabilities are hidden flaws in typical software and hardware operations that could potentially lead hackers to sensitive data, like the recent Meltdown and Spectre exploits. 

“In support of our recent security-first pledge, we’ve made several updates to our program,” the company says. “We believe these changes will enable us to more broadly engage the security research community and provide better incentives for coordinated response and disclosure that help protect our customers and their data.” 

Intel originally launched its Bug Bounty Program in March 2017 as an invitation-only plan for select security researchers. Now the program is open to all in hopes of minimizing another Meltdown-type discovery by using a wider pool of researchers. The company is also raising the reward amounts for all other bounties, some of which offer up to $100,000. 

Intel’s list of requirements for reporting side-channel vulnerabilities is somewhat short, including the 18-year-old age requirement, a six-month gap between working with Intel and reporting an issue, among other requirements. All reports must be encrypted with the Intel PSIRT public PGP key, they must identify an original undisclosed problem, include CVSS v3 calculation results, and so on. 

Intel wants security researchers to hunt down bugs in its processors, chipsets, solid state drives, stand-alone products like NUCs, networking and communication chipsets, and field-programmable gate array integrated circuits. Intel also lists five types of firmware, and three types of software that fall under its bug bounty umbrella: drivers, applications, and tools. 

Intel will award a Bounty for the first report of a vulnerability with sufficient details to enable reproduction by Intel,” the company states. “Intel will award a Bounty from $500 to $250,000 USD depending on the nature of the vulnerability and quality & content of the report. The first external report received on an internally known vulnerability will receive a maximum of $1,500 USD Award.” 

In January, researchers went public with a vulnerability found in processors dating back to 2011 that allows hackers to access the system memory and grab sensitive data. The attack vector takes advantage of a method processors use to predict the outcome of a process string. Using this predictive technique, processors store sensitive data in the system memory in an unsecured state. 

One method of gaining access to this data is called Meltdown, which requires special software to capture the data. With Spectre, hackers could trick legitimate apps and programs into coughing up the sensitive data. Both methods are theoretical, and currently not actively exploited in the wild, yet Intel seemed somewhat embarrassed over the potential issues. 

“We will continue to evolve the program as needed to make it as effective as possible and to help us fulfill our security-first pledge,” Intel promises. 

Movies & TV

From Crystal to Kimmel, these are the most memorable Oscars hosts of all time

There have been 76 hosts of the Academy Awards over its 90 ceremonies to date, but they haven't all been award-winning performances. Here are the most memorable Oscars hosts of all time.
Computing

The rumors were true. Nvidia’s 1660 Ti GPU, a $280 powerhouse, has arrived

Nvidia has officially launched the GTX 1660 Ti, its next-generation, Turing-based GPU. It promises to deliver all the performance and efficiency for all modern games, but without stepping into the high price range of the RTX series. 
Computing

Apple is reportedly set to showcase a new Mac Pro at WWDC 2019 in June

Our Mac Pro 2019 rumor roundup covers all the news, leaks, and rumors about Apple's new machine, set to be announced sometime in 2019. Here's what Apple has said, what the experts think, and what we're likely to see with the new Mac Pro.
Product Review

Samsung's Galaxy S10 phones are its most refined yet. Be prepared to pay up

Samsung has unveiled its lineup for its most popular smartphones, and it includes the Galaxy S10 and S10 Plus. The two flagship phones boast hole-punch cameras, fingerprint sensors embedded in the display, and beefier batteries.
Computing

Dodge the biggest laptop-buying mistakes with these handy tips

Buying a new laptop is exciting, but you need to watch your footing. There are a number of pitfalls you need to avoid and we're here to help. Check out these top-10 laptop buying mistakes and how to avoid them.
Computing

Great PC speakers don't need to break the bank. These are our favorites

Not sure which PC speakers work best with your computer? Here are the best computer speakers on the market, whether you're working with a tight budget or looking to rattle your workstation with top-of-the-line audio components.
Computing

Metro Exodus update brings DLSS improvements to Nvidia RTX 20-series PCs

Having issues in Metro Exodus? A February 21 update for the title recently delivered enhancements to Nvidia’s deep learning supersampling feature and other fixes for low-specced PCs. 
Computing

Confused about RSS? Don't be. Here's what it is and how to use it

What is an RSS feed, anyway? This traditional method of following online news is still plenty useful. Let's take a look at what RSS means, and what advantages it has in today's busy world.
Computing

Everything you need to know about routers, modems, combos, and mesh networks

Modem vs. router: what's the difference? We explain their functions so you can better diagnose any issues prior to contacting technical support. We also talk about a few variants you'll see offered by ISPs and retailers.
Computing

Limited-time sale knocks $500 off the price of the Razer Blade Pro 17

Looking for an ultra-powerful laptop for yourself or someone else? You're in for some luck. Razer is running a sale on some of its best gaming laptops, cutting down pricing on the Razer Blade 15 and the Razer Blade Pro 17. 
Emerging Tech

Engineer turns his old Apple lle into an wheeled robot, and even gives it a sword

How do you give new life to a 30-year-old computer? Software engineer Mike Kohn found a way by transforming his old Apple IIe into a wheeled robot. Check it out in all its 1980s glory.
Gaming

Want to play as Iron Man or Waluigi in GTA V? Our favorite mods make it possible

Grand Theft Auto V is best on the PC for many reasons, and modifications may be the most important. You can cause riots, spawn unique cars, and play as a cop with just a few extra files.
Computing

Does the GTX 1660 Ti's leaner design make it a better GPU than the RTX 2060?

Nvidia's GTX 1660 Ti is a new Turing GPU without ray tracing or DLSS, but how does it compare to its RTX brethren? We pit the 1660 Ti versus the RTX 2060 to find out in this comparison.
Computing

Zipping files on a Chromebook? Follow these four easy steps

Chromebooks support file compression, though they work a little differently than on Windows or Mac. Here's the step-by-step process to zipping files on a Chromebook, and then unzipping them again for extraction.