Earn $1M By Finding IOS 9 Security Flaw

Posted: Sep 22 2015, 11:28am CDT | by , Updated: Sep 22 2015, 8:42pm CDT, in Apple


This story may contain affiliate links.

Earn $1M By Finding iOS 9 Security Flaw

You can be a Millionaire by finding a flaw in Apple's latest and greatest iOS 9

Want to earn $1M and are you a good hacker? Then, there is certainly a chance for you.

Zerodium has announced that whoever succeeds in finding a flaw in iOS 9 and reports it secretly to them will be rewarded with a whopping one million.

The company will pay you the amount if you develop or successfully submit an iOS 9 zero-day exploit.

The company in its blog post stated that Apple is a big firm and the newest OS is working very well regarding security issues.

It further stated that such ideas will only fool you because “secure does not mean unbreakable”. They further stated that iOS 9 is the most expensive and high cost OS ever developed.

And therefore they have offered the Million Dollar iOS 9 Bug Bounty. Zerodium wants to find security breaches because it works with government agencies and corporate customers who are interested in regularly spying on people.

The terms and conditions through which the successful hacker will be able to claim the prize is that they have to secretly tell the security flaw to Zerodium and the bug must not be reported to Apple or publicly disclosed in any way.

Zerodium is willing to pay up to $3 million of bounty. But the offer will be terminated once it hits $3 million. Hackers have until October 31 to submit their findings.

They will have to submit a whole chain of vulnerabilities and explanation in detail.

This story may contain affiliate links.


Find rare products online! Get the free Tracker App now.

Download the free Tracker app now to get in-stock alerts on Pomsies, Oculus Go, SNES Classic and more.

Latest News


The Author

<a href="/latest_stories/all/all/32" rel="author">Ahmed Humayun</a>
Ahmed Humayun is a technology journalist bringing you the hottest tech stories of the day.




comments powered by Disqus