Apple wants to make iPhones safer than ever

(Image credit: Apple)

In another major push to improve device security Apple has now officially opened up its program to all researchers.

Before today, the iPhone maker's bug bounty program was invitation-based and only select security researchers were able to take part in the program to find vulnerabilities in iOS.

Now Apple has expanded its program by raising its maximum bug bounty reward from $200k to $1.5m and the company will also accept vulnerability reports for iPadOS, macOS, tvOS, watchOS and iCloud in addition to iOS.

Bug bounty rules and rewards

Apple also published a new page on its website which explains the rules of the bug bounty program along with a breakdown of the rewards researchers can earn for submitting reports on exploits they've discovered.

In order to be eligible for a bug bounty reward researchers must be the first party to report the issue to Apple Product security, provide a clear report with a working exploit and not disclose the issue publicly before Apple releases the security advisory for the report.

To earn the biggest reward the program has to offer, they will need to find security bugs that are new, affect multiple platforms, work on the latest hardware and software and impact sensitive components. Finding vulnerabilities in beta releases will earn researchers even more as Apple will add a 50 percent bonus on top of the regular payout for all bugs reported in a beta release.

Additionally, the company will pay a 50 percent bonus for regression bugs which are bugs that were previously patched in older versions of its software that have accidentally been reintroduced in its code at a later point. Vulnerabilities that can result in zero-click or one-click attacks will also earn researchers top prizes but they will need to submit a full exploit chain to claim their reward.

Via ZDNet

TOPICS
Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Phone & Communications
GlocalMe KeyTracker
When I tested this global tracker, it trounced the Apple AirTag in so many ways
Privacy Hero II
Privacy Hero II VPN Router
ThinkPhone 25 by Motorola
I reviewed the ThinkPhone 25 by Motorola and while it's not as fast as its predecessor, it's the superior phone in so many ways
FRITZ!Box 7690 WiFi 7 Router
FRITZ!Box 7690 router review
Ulefone Armor Pad 4 Ultra Thermal
Ulefone Armor Pad 4 Ultra Thermal rugged tablet review
Unihertz Tank Pad 8849
Unihertz Tank Pad 8849 rugged tablet review
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring