Browse by Tags

Tagged Content List
  • Blog Post: Are you prepared for the BlueHat Challenge?

    Today we are kicking off a new challenge so you can showcase your security prowess and, if we can, help you build some more. Our BlueHat Challenge is a series of computer security questions, which increase in difficulty as you progress. Only the rare ...read more
  • Blog Post: An update on the bounty programs

    Back in June of this year, we announced three new bounty programs that will pay researchers for techniques that bypass built-in OS mitigations and protections, for defenses that stop those bypasses and for vulnerabilities in Internet Explorer 11 Preview ...read more