Young Hacker Makes $1m. Legally.

A 19-year-old Argentinian has just made history as the first to earn over $1,000,000 in bounty awards on HackerOne.

Since joining HackerOne in 2015, Santiago Lopez (pictured) has reported over 1,670 valid unique vulnerabilities to companies such as Verizon Media Company, Twitter, Wordpress, Automattic, and HackerOne, as well as private programs. He consistently tops the HackerOne leaderboards, with the 91st percentile for signal, 84th percentile for impact, 2nd overall on the platform, and over 37,000+ reputation!

As a self-taught hacker, primarily using blogs and YouTube to expand his skills, Santiago shows us all that learning to hack is not reserved for the traditional classroom.

According to a recent study, 81% of hackers point to online resources and blogs as their primary source for hacking education, while just six percent have completed a formal class or certification on hacking.

Bug bounty hackers are filling a new niche that is in high demand in the booming cybersecurity job market. Organisations like Starbucks, Verizon Media, Toyota, Airbnb and even government agencies such as the US Department of Defense are working with ethical hackers to find security vulnerabilities in their systems before they can be exploited.

These organisations are increasingly relying on the hackers as another layer to keep their customers safe and many are willing to pay top dollar for these vulnerabilities. Companies pay an average of $2,000 for a critical vulnerability, with bounties as high as $100,000 for a single flaw.

Organisations and government agencies are attracted to bug bounty programs because they can work with some of the brightest minds without being geographically restricted or having to go through lengthy recruitment processes. To put this into perspective, the US saw more than 313,000 cybersecurity job openings between September 2017 and August 2018.

Hackers are now building successful careers with bug bounties. Hacking is becoming one of the most lucrative jobs in the world, earning more than physicians and architects in the US.

A physician earns an average of $195,000 and an architect earns an average of $115,000; meanwhile, the top paid hackers are earning three times that as some companies are paying out millions each year. HackerOne has a community of over 400,000 hackers.

These hackers were paid over $19 million in 2018 alone and more than $50 million in total, all in the name of making the Internet safer.

Considering all the benefits on offer, including a flexible work schedule, a great deal of autonomy, an active community to learn from and a potential to earn good money, how can you embark on a career as a hacker? The best news is that one doesn’t need to go back to school.

Many skills required to become a successful hacker can be learned online, for free or minimal cost. Anyone with the drive and high degree of curiosity can become a hacker.

So where to start?

Embarking on a career in hacking has never been more encouraged or more rewarding, both financially and personally. Even though anyone can essentially teach themselves how to hack with the tools available online today, the one skill hackers must inherently have is the ability to problem solve and a strong sense of curiosity around how technology works and how it could possibly fail us. With that, here are my top resources to learn how to hack:

The ethical hacking industry is booming and, whether you are looking for a lucrative hobby or full-time pursuit, there is no better time to embark on a career as a hacker.

Infosecurity           HackerOne:          ATV

You Might Also Read:

Ethical Hacker Guilty Of Malware Attacks:

Hackers Paid Big Money To Improve Cybersecurity:

 

 

« Israel Hits Back At Hamas Cyber Attackers
AI In Cyber Security Is Worth Almost $5B »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Homeland Security Advanced Research Projects Agency (HSARPA)

Homeland Security Advanced Research Projects Agency (HSARPA)

HSARPA's Cyber Security Division (CSD) was set up to address DHS cyber operational and critical infrastructure protection requirements.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.