AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Torch web browser for xp2/2/2023 ![]() ![]() ![]() At the time, there was a widespread belief that, despite these public displays of vulnerabilities in Apple products, OS X was significantly more secure than any other competitors. The first contest in 2007 was conceived and developed by Dragos Ruiu in response to his frustration with Apple Inc.'s lack of response to the Month of Apple Bugs and the Month of Kernel Bugs, as well as Apple's television commercials that trivialized the security built into the competing Windows operating system. ![]() The Pwn2Own contest serves to demonstrate the vulnerability of devices and software in widespread use while also providing a checkpoint on the progress made in security since the previous year. Winners of the contest receive the device that they exploited and a cash prize. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. ![]() First held in April 2007 in Vancouver, the contest is now held twice a year, most recently in April 2021. Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference. Please help update this article to reflect recent events or newly available information. ![]()
0 Comments
Read More
Leave a Reply. |