Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
Over the years, we've put a lot of work into helping secure the computing ecosystem and limiting the number of issues in our products. The security researcher community is critical to these efforts, as they help us find vulnerabilities in our software that we may have missed.
Now we're taking it even further. We're launching three new bounty programs that will pay researchers for techniques that bypass built-in OS mitigations and protections, for defenses that stop those bypasses and for vulnerabilities in Internet Explorer 11 Preview. Please visit here for more details.
Best of luck and I look forward to seeing your submissions.
Dustin Childs Group Manager, Response Communications Microsoft Trustworthy Computing