Unlock stock picks and a broker-level newsfeed that powers Wall Street.

How you can report security problems to tech companies like Apple

In This Article:

FILE- In this Jan. 31, 2019, file photo Grant Thompson and his mother, Michele, look at an iPhone in the family's kitchen in Tucson, Ariz., on Thursday, Jan. 31, 2019. Apple has released an iPhone update to fix a FaceTime flaw that allowed people to eavesdrop on others while using its group video chat feature. The repair is included in the latest version of Apple's iOS 12 system, which became available to install Thursday. Apple credited the Tucson teenager, Grant Thompson, for discovering the FaceTime bug. (AP Photo/Brian Skoloff, File)
FILE- In this Jan. 31, 2019, file photo Grant Thompson and his mother, Michele, look at an iPhone in the family's kitchen in Tucson, Ariz., on Thursday, Jan. 31, 2019. (AP Photo/Brian Skoloff, File)

If you see a major security vulnerability in a tech company’s hardware or software, the best you can do is reach out and hope you get a response.

And if you don’t get a response, you end up like Grant Thomas, the 14-year-old boy who found a severe privacy flaw in Apple’s (AAPL) FaceTime internet-calling app and tried, with his mother, to warn the iPhone maker.

But as tempting as it might be to point and laugh at Apple for the FaceTime fail that the firm didn’t patch until Thursday, the company fields security reports better than many.

Meanwhile, many firms rushing to put a chip in one home gadget or another have yet to take the first steps of providing any clear channel for security researchers or individual customers to tip them off about a vulnerability.

There are, however, ways for you to make a difference by reaching out when you find a vulnerability of your own. And it could net you some extra cash.

Nine days for a zero-day

Thompson, a Tucson, Ariz., high-school freshman, found the FaceTime bug when trying to add a friend to a group call before a Fortnite game—and realized that the friend’s microphone had gone live without him answering.

Apple offers a dedicated email address for security researchers at product-security@apple.com, but it’s not listed on the company’s customer-support page. So Thompson’s mother Michele tried getting the attention of the company’s @AppleSupport Twitter account and eventually tweeted out the news herself.

Nine days after the discovery, Apple responded by deactivating Group FaceTime. The company shipped patches for iOS and macOS Thursday. Apple has since elected to pay Thompson a bug bounty for his disclosure and make a contribution, also unspecified, to his education.

(Bug bounties are rewards, usually cash, paid out by firms to researchers who confidentially report vulnerabilities to them. They can start at under $200 and climb into tens of thousands of dollars, depending on the severity of the “vuln”; a study by the security firm HackerOne found that bounties for critical issues topped $2,000 last year.)

It all looks bad. Tuesday, House Energy & Commerce Committee members Reps. Frank Pallone, Jr. (D-N.J.) and Jan Schakowsky (D-Il.), sent a letter to Apple CEO Tim Cook that said, “we do not believe Apple has been as transparent as this serious issue requires.”

But from a security researcher’s perspective, it also looks like the worst-case scenario of somebody uncovering a vulnerability and then only trying to report it to customer-support contacts insufficiently trained to escalate things to the security team.