Microsoft pays big to strengthen software defense

Jul 29, 2012
A woman works on her computer at a coffee shop on July 25. As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.

As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.

The winners of Microsoft's first Blue Hat prize were unveiled at a hip club at a mobbed party complete with dancers, high-energy DJ, and of shimmering confetti.

A top prize of $200,000 went to doctoral student Vasilis Pappas for an advance in countering "the most popular attack techniques we're seeing today," said Microsoft security response center senior director Mike Reavey.

"We posed a challenge to the researcher community and asked them to shift their focus from solely identifying and reporting individual vulnerabilities to investing in new lines of defensive research that could mitigate entire classes of attacks," Reavey said of the prize.

Microsoft awarded $50,000 to the second-place finisher, and a fortune in software to the researcher who placed third out of the 20 submissions entered in the Blue Hat competition.

Technology from the finalists has been integrated into a software toolkit for protecting against threats, according to Microsoft trustworthy computer grout general manager Matt Thomlinson.

"The Blue Hat prize is more than a competition; it's the future of security defense, where the community comes together to collectively take on some of the toughest problems we face and make the computing ecosystem safer," Thomlinson said.

Each of the top three entries dealt with a way cyber attackers twist of benign software already in a to malicious ends, according to Microsoft.

The Blue Hat winners were announced as a conference of computer security professionals gave way to the largest known gathering of hackers, Def Con, which ends Sunday.

Explore further: Detecting and blocking leaky Android apps

Related Stories

Computer hackers and defenders mix in Las Vegas

Jul 24, 2012

Rival factions from the Internet security world will mix warily this week at a pair of Las Vegas conferences gathering computer security experts and software savants who make sport of hacking them.

Microsoft probing new hole in IE security

Feb 03, 2010

Fresh from patching an Internet Explorer (IE) flaw exploited in cyberattacks on Google and other firms, Microsoft is looking into a newly exposed vulnerability in the browser software.

Hackers talk their way into computers

Jun 16, 2011

Cyber crooks are avoiding the need for slick software skills by talking their way past computer defenses with old-fashioned telephone calls.

Recommended for you

Detecting and blocking leaky Android apps

1 hour ago

Nine times out of ten, that Android app is connecting to multiple internet destinations without your knowledge, more than half of them require access to the sensitive, personal information on your mobile device in order to ...

Unsavory hits the App Store and Google Play

May 19, 2015

Almost 90 percent of restaurant workers in the United States do not have access to paid sick days. Unsavory, a new mobile game available for iOS and Android lets players take the role of these workers preparing food to see ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.