Pwn2Own hacking contest puts record $560K on the line
But it was the cash that caught researchers' attention.
The $100,000 prize for an exploit of Chrome or IE10, for example, was 67% more than Google paid last year in its inaugural Pwnium contest, and over six times the maximum paid at Pwn2Own in 2011 for hacking a desktop browser.
The always-quotable Charlie Miller, who won prizes at Pwn2Own four years in a row -- the only "four-peat" in the contest's history -- bemoaned the high awards.
"I have to say the Pwn2Own prize money is serious," Miller said on Twitter yesterday. "I feel like a 1950's pro athlete wondering why current athletes are paid so much."
Miller, who won at Pwn2Own while a security consultant, now works for Twitter.
Others took up Miller's line of thought, with Larry Seltzer, a long-time security reporter and now the editorial director of Byte, chiming in with, "They're all using exploit-enhancing drugs these days."
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Cybercrime and Hacking White Papers | Webcasts