Tag

bug bounty

0 views collected around this technical thread.

iQIYI Technical Product Team
iQIYI Technical Product Team
Dec 25, 2020 · Information Security

iQiyi Security Incident Response Center Vulnerability Handling Policy (Version 3.0)

iQiyi Security Incident Response Center Vulnerability Handling Policy version 3.0 outlines scope, principles, reporting process, severity scoring, reward system, user levels, dispute resolution, and prohibitions, emphasizing dedicated handling, point-based rewards, and strict rules for disclosures and malicious activity.

bug bountyinformation securityrisk assessment
0 likes · 13 min read
iQiyi Security Incident Response Center Vulnerability Handling Policy (Version 3.0)
Qunar Tech Salon
Qunar Tech Salon
Jul 21, 2016 · Information Security

Exploiting Premium Phone Numbers to Steal Money from Instagram, Google, and Microsoft

The article details how attackers exploit premium phone numbers in Instagram, Google, and Microsoft’s two‑factor authentication to generate automated voice calls, earn money per call, and how the vulnerabilities were reported, mitigated, and rewarded through bug‑bounty programs.

GoogleInstagramMicrosoft
0 likes · 13 min read
Exploiting Premium Phone Numbers to Steal Money from Instagram, Google, and Microsoft