Tech: Lazada Launches Public Bug Bounty Program
If you are an ethical hacker and in need of an extra buck then you are in luck!
Lazada, a leading eCommerce platform in South East Asia has launched a public bug bounty program and will offer hackers up to US$10,000 for identifying bugs within its websites.
“Given the importance of data and personal information, Lazada takes great care in protecting our customers and we have worked to patch these vulnerabilities, to ensure a safe shopping platform,” Lazada Group chief risk officer Alan Chan said in a statement.
“With the evolving nature of data security, as well as the aggressive nature of hackers who exploit technology to steal data, we believe in working with the larger cybersecurity community to strengthen our IT ecosystems.”
The program ran privately for 18 months before deciding to open it up to the whole cybersecurity community with the help of YesWeHack.
With the launch of this public bug bounty program, Lazada is making a statement to the eCommerce industry, and highlighting the priority it places on security and transparency for its customers and partners,
Since the launch of its private bug bounty program last January, Lazada has worked with over one hundred ethical hackers to surface vulnerabilities and has awarded over US$150,000 in bounties.
The company is now taking additional steps in providing transparency and security to its customers, by transferring the areas previously tested in the private program to a public program.
This allows cybersecurity researchers from all over the world to participate in the program and report vulnerabilities to the eCommerce platform.
“By launching this latest public bug bounty program, we are sending a clear message to everyone that we value the importance of data in our possession,” Lazada head of CyberDefence Frank Vervial said.
Founded in 2012 and headquartered in Singapore, Lazada was acquired by Alibaba Group in 2016.
The company has operations in Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam.