Microsoft pays big to strengthen software defense

Jul 29, 2012
A woman works on her computer at a coffee shop on July 25. As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.

As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.

The winners of Microsoft's first Blue Hat prize were unveiled at a hip club at a mobbed party complete with dancers, high-energy DJ, and of shimmering confetti.

A top prize of $200,000 went to doctoral student Vasilis Pappas for an advance in countering "the most popular attack techniques we're seeing today," said Microsoft security response center senior director Mike Reavey.

"We posed a challenge to the researcher community and asked them to shift their focus from solely identifying and reporting individual vulnerabilities to investing in new lines of defensive research that could mitigate entire classes of attacks," Reavey said of the prize.

Microsoft awarded $50,000 to the second-place finisher, and a fortune in software to the researcher who placed third out of the 20 submissions entered in the Blue Hat competition.

Technology from the finalists has been integrated into a software toolkit for protecting against threats, according to Microsoft trustworthy computer grout general manager Matt Thomlinson.

"The Blue Hat prize is more than a competition; it's the future of security defense, where the community comes together to collectively take on some of the toughest problems we face and make the computing ecosystem safer," Thomlinson said.

Each of the top three entries dealt with a way cyber attackers twist of benign software already in a to malicious ends, according to Microsoft.

The Blue Hat winners were announced as a conference of computer security professionals gave way to the largest known gathering of hackers, Def Con, which ends Sunday.

Explore further: Mandela phone app for tourists in S.Africa

Related Stories

Computer hackers and defenders mix in Las Vegas

Jul 24, 2012

Rival factions from the Internet security world will mix warily this week at a pair of Las Vegas conferences gathering computer security experts and software savants who make sport of hacking them.

Microsoft probing new hole in IE security

Feb 03, 2010

Fresh from patching an Internet Explorer (IE) flaw exploited in cyberattacks on Google and other firms, Microsoft is looking into a newly exposed vulnerability in the browser software.

Hackers talk their way into computers

Jun 16, 2011

Cyber crooks are avoiding the need for slick software skills by talking their way past computer defenses with old-fashioned telephone calls.

Recommended for you

Mandela phone app for tourists in S.Africa

7 hours ago

A phone app tracing the footsteps of Nelson Mandela was launched Wednesday in South Africa to encourage tourists to explore his life story, 25 years after his release from prison.

App to test synaesthesia

8 hours ago

Four in hundred people have a special mix up of their senses, called synaesthesia. A new app from Radboud University contains four playful tests for synaesthesia. Should you happen to have synaesthesia, you ...

Windows Insiders can try out Project Spartan browser

Mar 31, 2015

Microsoft has opened up the (literal) windows, called in creatives, and has been engineering a next-generation browser. Project Spartan is to reflect the general mood of fresh air at Redmond. Although "Project ...

New taxi app challenges Uber in S.Korea

Mar 31, 2015

South Korea's top mobile messenger operator launched a new web-based cab-hailing service Tuesday to compete with California-based Uber, whose service has been subjected to crackdowns from state regulators.

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.