Microsoft pays big to strengthen software defense

Jul 29, 2012
A woman works on her computer at a coffee shop on July 25. As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.

As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.

The winners of Microsoft's first Blue Hat prize were unveiled at a hip club at a mobbed party complete with dancers, high-energy DJ, and of shimmering confetti.

A top prize of $200,000 went to doctoral student Vasilis Pappas for an advance in countering "the most popular attack techniques we're seeing today," said Microsoft security response center senior director Mike Reavey.

"We posed a challenge to the researcher community and asked them to shift their focus from solely identifying and reporting individual vulnerabilities to investing in new lines of defensive research that could mitigate entire classes of attacks," Reavey said of the prize.

Microsoft awarded $50,000 to the second-place finisher, and a fortune in software to the researcher who placed third out of the 20 submissions entered in the Blue Hat competition.

Technology from the finalists has been integrated into a software toolkit for protecting against threats, according to Microsoft trustworthy computer grout general manager Matt Thomlinson.

"The Blue Hat prize is more than a competition; it's the future of security defense, where the community comes together to collectively take on some of the toughest problems we face and make the computing ecosystem safer," Thomlinson said.

Each of the top three entries dealt with a way cyber attackers twist of benign software already in a to malicious ends, according to Microsoft.

The Blue Hat winners were announced as a conference of computer security professionals gave way to the largest known gathering of hackers, Def Con, which ends Sunday.

Explore further: Body by smartphone

add to favorites email to friend print save as pdf

Related Stories

Computer hackers and defenders mix in Las Vegas

Jul 24, 2012

Rival factions from the Internet security world will mix warily this week at a pair of Las Vegas conferences gathering computer security experts and software savants who make sport of hacking them.

Microsoft probing new hole in IE security

Feb 03, 2010

Fresh from patching an Internet Explorer (IE) flaw exploited in cyberattacks on Google and other firms, Microsoft is looking into a newly exposed vulnerability in the browser software.

Hackers talk their way into computers

Jun 16, 2011

Cyber crooks are avoiding the need for slick software skills by talking their way past computer defenses with old-fashioned telephone calls.

Recommended for you

Body by smartphone

1 hour ago

We love our smartphones. Since they marched out of the corporate world and into the hands of consumers about 10 years ago, we've relied more and more on our iPhone and Android devices to organize our schedules, ...

Breakthrough elastic cloud-to cloud networking

3 hours ago

Scientists from AT&T, IBM and Applied Communication Sciences (ACS) announced a proof-of-concept technology that reduces set up times for cloud-to-cloud connectivity from days to seconds. This advance is a major step forward ...

Security CTO to detail Android Fake ID flaw at Black Hat

17 hours ago

Where have you heard this before: A team of security researchers discover a security flaw in Android devices. This is, however, news. This time, experts are talking about a flaw that involves a widespread ...

Software provides a clear overview in long documents

Jul 25, 2014

In the future, a software will help users better analyze long texts such as the documents for calls for bids, which are often more than one thousand pages long. Experts at Siemens' global research unit Corporate ...

User comments : 0