LINE

    Text:AAAPrint
    Sci-tech

    Bounty platforms use 'white hat' hackers to prevent China's cyber attacks

    1
    2017-03-31 15:12chinadaily.com.cn Editor: Feng Shuang ECNS App Download
    A white hat hacker explains cyber security technology at the China White Hat Conference in Shenzhen, Guangdong province, on March 30, 2017. (Photo provided to chinadaily.com.cn)

    A "white hat" hacker explains cyber security technology at the China White Hat Conference in Shenzhen, Guangdong province, on March 30, 2017. (Photo provided to chinadaily.com.cn)

    More than 800 Chinese "white hat" hackers gathered in Shenzhen, South China's Guangdong province, on Thursday, to attend the China White Hat Conference held by 360 Business Security Group's Butian Vulnerability Response Platform (Butian).

    Unlike movie-fueled myths, most of them looked like ordinary young people in their early 20s rather than cynical, mysterious computer "nerds".

    Not yet acquiring much attention from the public, "white hat" hackers are a group of computer wizes who use hacking skills to identify the security loopholes in corporation or government computer systems to help them prevent cyber attacks.

    Qi Xiangdong, chairman of 360 Business Security Group, one of China's leading online security service providers, said at the conference that a total of 31,633 "white hats" have registered on Butian since 2013, discovering more than 200,000 vulnerabilities.

    Butian, established in March 2013, is China's first bounty vulnerability response platform.

    Aiming to act as a bridge connecting corporations with "white hats", it has developed a unique Security Response Center model, which refers to using cash awards offered by corporations to encourage "white hats" to identify loopholes for them.

    The 2016 China Internet Security Report released by the 360 Cyber Security Center said that Butian found more than 37,000 loopholes last year on over 30,000 websites.

    According to the report, 93.9 percent of the loopholes were process cases that could have been effectively used or invaded.

      

    Related news

    MorePhoto

    Most popular in 24h

    MoreTop news

    MoreVideo

    News
    Politics
    Business
    Society
    Culture
    Military
    Sci-tech
    Entertainment
    Sports
    Odd
    Features
    Biz
    Economy
    Travel
    Travel News
    Travel Types
    Events
    Food
    Hotel
    Bar & Club
    Architecture
    Gallery
    Photo
    CNS Photo
    Video
    Video
    Learning Chinese
    Learn About China
    Social Chinese
    Business Chinese
    Buzz Words
    Bilingual
    Resources
    ECNS Wire
    Special Coverage
    Infographics
    Voices
    LINE
    Back to top Links | About Us | Jobs | Contact Us | Privacy Policy
    Copyright ©1999-2018 Chinanews.com. All rights reserved.
    Reproduction in whole or in part without permission is prohibited.
    主站蜘蛛池模板: 元朗区| 盐源县| 曲水县| 蓬溪县| 宜黄县| 大港区| 淄博市| 华阴市| 东乌| 台北县| 抚宁县| 宁安市| 团风县| 新津县| 隆安县| 堆龙德庆县| 舟山市| 潜山县| 凉城县| 梨树县| 迁西县| 阿合奇县| 温宿县| 连平县| 永丰县| 曲松县| 上思县| 蚌埠市| 调兵山市| 丁青县| 崇礼县| 灵山县| 广西| 郎溪县| 天等县| 广安市| 苗栗县| 屯门区| 台东市| 迁西县| 寿阳县|