Google Ups Bug Bounty Awards

  /     /     /  
Publicated : 22/11/2024   Category : security


Google Ups Bug Bounty Awards


Researchers now can get up to $7,500 per vulnerability they discover in Google applications



Google has made its vulnerability reward program even more lucrative for security researchers who discover bugs in its software and services.
The nearly three-year-old bug bounty program now offers researchers $7,500 per cross-site scripting flaw found on https://accounts.google.com, up from $3,133.70, and $5,000 for XSS and other flaws in Gmail and Google Wallet, up from $1,337. Google will now pay $3,114.70 per bug found in other Google sites -- up from $500 -- and $7,500 for significant authentication bypass and information leak flaws, which previously yielded $5,000 per bug.
Why the raise for researchers? Google security team members Adam Mein and Michal Zalewski said in a blog post announcing the changes that the increased payments should better reward the relative difficulty of finding bugs in Googles properties.
In recognition of the difficulty involved in finding bugs in our most critical applications, were once again rolling out updated rules and significant reward increases, they said in the post.
Google to date has paid out $828,000 to more than 250 researchers since launching the vulnerability reward program in November 2010. Some of those researchers donated their rewards to charity as part of Googles program. Our vulnerability reward programs have been very successful in helping us fix more bugs and better protect our users, while also strengthening our relationships with security researchers, the Google team says.
The increase in payment for vulnerability finds comes on the heels of Googles
announcement late last month of a more aggressive disclosure policy
that would allow its own researchers to provide details on zero-day bugs they find in other vendors software within seven days if the affected vendor hasnt provided an advisory or patch. That change in disclosure policy was aimed at pressuring vendors to more quickly fix bugs.
Google researchers had recently discovered attacks using a zero-day in another unnamed vendors software. We recently discovered that attackers are actively targeting a previously unknown and unpatched vulnerability in software belonging to another company. This isnt an isolated incident -- on a semi-regular basis, Google security researchers uncover real-world exploitation of publicly unknown (zero-day) vulnerabilities. We always report these cases to the affected vendor immediately, and we work closely with them to drive the issue to resolution, the Googlers said in
that post
.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Google Ups Bug Bounty Awards