Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Apple opens 2026 SRD program for iOS security research

Researchers gain access to beta iOS releases, a private community, and automatic entry into Apple’s Security Bounty program.

byKerem Gülen
September 16, 2025
in Cybersecurity
Home News Cybersecurity

Apple is now accepting applications for its 2026 Security Research Device (SRD) program, which provides specially modified iPhones to security researchers for investigating iOS vulnerabilities.

The program is designed to facilitate deep security analysis without requiring researchers to bypass the platform’s built-in protections.

The application period closes on October 31, 2025.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

What the Apple 2026 SRD program provides to researchers?

Participants in the program receive a customized iPhone on a 12-month loan. This device is not a standard consumer phone and is intended exclusively for security research. Key features and benefits include:

  • Shell access. Researchers can run commands and tools directly on the device.
  • Custom entitlements. Participants can set their own permissions for apps and processes.
  • Kernel modification. The device allows for modifications to the core component of the operating system.
  • Access to beta software. Researchers get early versions of upcoming iOS releases to test for vulnerabilities.
  • A private research community. Participants can collaborate and share knowledge with other researchers in the program.

The scope of research covers all of iOS and the iPhone hardware, with the exception of Apple Pay and third-party applications. Apple requires that the device remain on the researcher’s premises at all times.

Vulnerability reporting and bounties

The SRD allows researchers to find and report vulnerabilities to Apple without concerns about circumventing security layers.

The Security Research Device (SRD) is a specially fused iPhone that allows you to perform iOS security research without having to bypass its security features.

All vulnerabilities discovered using the device are automatically considered for Apple’s Security Bounty program. The program offers financial rewards for valid security issues, with bonus payments for bugs found in beta or preview software versions.

Eligibility and how to apply to Apple 2026 SRD program

To qualify for the program, applicants must meet several criteria:

  • Have a proven track record of finding security issues on Apple platforms or other modern operating systems.
  • Reside in one of the eligible countries or regions.
  • Be the legal age of majority in their jurisdiction.
  • Not be a current or recent Apple employee (within the last 12 months).

Experienced researchers can find more details and the application form on Apple’s Security Research website.


Featured image credit

Tags: 2026 SRDAppleFeaturediOS security research

Related Posts

Shiny Hunters breach Kering, exposing 7.4M Gucci, Balenciaga, and Alexander McQueen customer records

Shiny Hunters breach Kering, exposing 7.4M Gucci, Balenciaga, and Alexander McQueen customer records

September 16, 2025
Gmail hit by AI prompt injection attack via calendar

Gmail hit by AI prompt injection attack via calendar

September 15, 2025
FreeVPN.one Chrome extension stole user screenshots

FreeVPN.one Chrome extension stole user screenshots

September 15, 2025
UAE’s new K2 Think AI model jailbroken hours after release via transparent reasoning logs

UAE’s new K2 Think AI model jailbroken hours after release via transparent reasoning logs

September 12, 2025
Apple CarPlay vulnerability leaves vehicles exposed due to slow patch adoption

Apple CarPlay vulnerability leaves vehicles exposed due to slow patch adoption

September 12, 2025
Modstealer malware bypasses antivirus, targets crypto wallets

Modstealer malware bypasses antivirus, targets crypto wallets

September 12, 2025

LATEST NEWS

Shiny Hunters breach Kering, exposing 7.4M Gucci, Balenciaga, and Alexander McQueen customer records

Amazon schedules September 30 Fall Event to showcase Echo, Fire TV, and Kindle updates

OpenAI hardware chief calls for kill switches to counter devious AI models

DeepMind CEO says learning how to learn is the key skill for the AI era

Apple opens 2026 SRD program for iOS security research

M&S: Rachel Higham resigns after cyberattack

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.