india employmentnews

Apple Security Bounty Program: Apple's amazing offer, you can become a millionaire by hacking iPhone..

 | 
Social media

If you are also an expert in coding and are looking for an opportunity where you can win a big cash prize by showing your skills, then you can win a prize of up to crores of rupees under the Apple Security Bounty Program. This opportunity at Apple is for those who can show their skills by breaking Apple's security and hacking the iPhone.

The Security Bounty Program was started in 2022. This program was started for veterans in coding. Under this program, the company invites coders to break into its secure iPhone system.

How much cash prize will be available?

According to the report of Financial Express, the prize amount under this program can range from $ 5000 (about Rs 437339) to $ 2 million (about Rs 16 crore).

The prize amount may vary according to different categories. For example, if a person succeeds in breaking into the device through physical access, then you can win up to $250000 (about 2.18 crores), up to $1.50 lakh (about 1.31 crores) for attacking the device through a user installed app and if you succeed in attacking the network with user interaction, then you can win up to $2.50 lakh (about 2.18 crores).

The company will give 1 million dollars (about 8.74 crores) as a prize to the hacker who does a zero-click attack without user interaction, and the same amount will be given as a prize to the hacker who does a remote attack in a private cloud compute. Now let's talk about the grand prize, if a hacker succeeds in bypassing the security of the iPhone in lockdown mode, then the company will give a prize money of 2 million dollars (about 17.49 crores). This feature has been designed to give users an extra level of security from digital threats.

Note
The Apple Security Bounty Program covers Apple products (iPhones, Watches, and Macs, etc.). But note that vulnerabilities caused by Apple Pay or phishing or social engineering attacks are currently excluded from this program. The benefits of this program are limited to the company's hardware and software only, which means that vulnerabilities found in third-party services are not covered under this program.

Disclaimer: This content has been sourced and edited from TV9. While we have made modifications for clarity and presentation, the original content belongs to its respective authors and website. We do not claim ownership of the content.