Tor Project to Start Bug Bounty Program — Get Paid for HACKING!

The non-profit organization behind TOR – the largest online anonymity network that allows people to hide their real identity online – will soon be launching a “Bug Bounty Program” for researchers who find loopholes in Tor apps.

The bounty program was announced during the recurring ‘State of the Onion’ talk by Tor Project at Chaos Communication Congress held in Hamburg, Germany.

Bug

North Korea's Red Star OS (Looks Like Mac OS X) Spies on its Own People

North Korea has its own homegrown computer operating system that looks remarkably just like Apple’s OS X, which not only prevents potential foreign hacking attempts but also provides extensive surveillance capabilities.

Two German researchers have just conducted an in-depth analysis of the secretive state’s operating system and found that the OS does more than what is known about it.

CVE-2015-5663 (winrar)

The file-execution functionality in WinRAR before 5.30 beta 5 allows local users to gain privileges via a Trojan horse file with a name similar to an extensionless filename that was selected by the user.

CVE-2015-7249 (zxhn_h108n_r1a_firmware)

ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE allow remote authenticated users to bypass intended access restrictions via a modified request, as demonstrated by leveraging the support account to change a password via a cgi-bin/webproc accountpsd action.