Today, when the most effective fight against COVID-19 is made with the vaccine, the states keep the vaccination information of the citizens and the list of contacts with the special applications they have developed. In addition, the use of various sensitive information such as identity, vaccine, health information increases the likelihood of these applications being cyber-attacked. BugBounter, which meets the needs of companies to audit, find and verify security vulnerabilities quickly and reliably with over 1000 independent researchers. com draws attention to the devastating consequences of possible cyberattacks that could target applications where sensitive data is stored, following the discovery of a vulnerability in the application used in Australia that would allow this possibility to occur.
What happens in Australia can happen in any country
A security researcher has found a vulnerability in the Australian government’s digital vaccination passport application, which automatically uses vaccination information for individuals to easily change their vaccination information. Governments around the world are developing special apps and contact tracing solutions to slow the spread of COVID-19. Citizens are also expected to use these applications to enter public areas such as cafes, markets, airports and shopping centers.
According to the Vaccines Passport Privacy Study conducted by NordVPN on the subject, 66 percent of the participants state that they can use the vaccination passport application when it is compulsory for travel, but according to another study conducted in January, 75 percent of the participants are concerned about the security of these applications.
BugBounter. Murat Lostar, Co-Founder of com, said: “The coronavirus creates an ideal environment where cyber attackers can exploit people’s fears and vulnerabilities. If they get their vaccine information, it is possible for cyber attackers to access vaccine passports and identity chips. That’s why public administrators and such applications Companies involved in the development of the company prefer bug bounty programs, which are the most effective method in discovering potential and existing vulnerabilities, providing them with great benefits.By means of bug bounty programs, they can have their systems audited by the most talented people at the most affordable cost against a possible cyber attack.BugBounter. com, which we pioneer in our country, the institutions we work with pay only for security vulnerabilities whose existence has been verified by experienced experts, and in this way, they can efficiently manage their budgets. Grams of time and budget allocated for safety tests are not wasted with false positive/false negative information and hypothesis reports. Since companies can determine the award, schedule and scope of the program themselves and arrange them at any time, they can have the security of their systems checked in accordance with their current budgets and business plans. After the security researchers of the platform report the vulnerabilities they find, our authorized teams complete the verification processes in a short time, rank them according to their importance and forward them to the security teams determined by the company. The control of the closed gaps is also carried out by the same experts. “