Sunday, June 7, 03:57
Home security Google: New bug bounty program to detect data abuse incidents

Google: New bug bounty program to detect data abuse incidents

GoogleGoogle announced yesterday that it will launch one new bug bounty program, through which security investigators can report anyone suspicious activity as well as incidents of abuse or theft data users from third-party applications.

The name of the new bounty program will be "Developer Data Protection Reward Program (DDPRP)». As mentioned above, researchers will be able to report cases in which third parties applications, who have access to the Google API, Android apps (included in the Play Store), and Chrome apps and extensions (available in the Chrome Web Store) are trying to abuse data.

This program aims primarily to detect cases of abuse or sale of their data users without their consent.

A second goal, though, is to reward them researchers who discover and report suspicious activities with sufficient evidence.

Researchers will be able to report such incidents via the DDPRP page on HackerOne, a bug bounty platform, which Google uses to run some of its bounty programs. Google aims to investigate all cases of abuse and suspend all dangerous applications.

According to Google, Investigators that will bring valid data abuse reports will be rewarded with large sums of money (up to 50.000 $).

Following his example Facebook

Google seems to have followed suit Facebook and Instagram, which started bug bounty programs some years ago.

For example, in April of 2018, after the scandal Cambridge Analytica, Facebook had announced it would offer big rewards to researchers who would discover similar applications that secretly collect and misuse platform user data.

In August, Facebook decided to use the same program to report instances of abuse related to Instagram.

Although Google has not encountered any serious incidents of personal data breach, it has decided to launch this bug bounty program preventively. After all, he manages one huge amount of personal data and is responsible for protecting them. The attacks on cyberspace is a very common phenomenon and the largest companies and businesses have fallen victim to unscrupulous hackers.

An infringement incident, similar to Facebook, could damage the company's reputation.

Also, the Play Store bug bounty program Google will now include any Android app that has over 100 millions of users. Researchers can now report to Google the bugs they detect in these applications. Its manufacturer Android OS will monetize researchers who provide valid bug reports, even if these applications do not have their own bug bounty programs.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Lyrics from AI technology or from people: Can you tell them apart?

While a large percentage of people can recognize when they are talking on a chatbot instead of a human operator, it seems that this is not the case ...

Technology and children: When are they ready for safe use?

Today's children and teens use various messaging apps and social media to ...

Call of Duty Black Ops Cold War: The first video leaked

The first video from the gameplay of Call of Duty 2020, which is rumored to be called Black Ops Cold War, has just been revealed.

Elon Musk: "It's time to break up Amazon"

Elon Musk intensifies the fight with Jeff Bezos with a new tweet: The General Manager of Tesla Inc., Elon Musk, said ...

Attack on America's 5G towers on Saturday!

Protests over 5G connectivity are scheduled to take place over the weekend, according to NATE. According to a recommendation that was identified ...

Windows 10 Updates: You can block them with Wu10Man!

Microsoft launched the Windows 10 update in May 2020, so it will be available on your computer soon ....

ECh0raix Ransomware: New campaign targets QNAP NAS devices!

Malicious agents behind eCh0raix Ransomware have launched a new campaign targeting QNAP NAS devices. ECh0raix was observed ...

Mac: How to change the storage location of your screenshots?

When you take screenshots on your Mac device using the Shift-Command-3 shortcut to take a screenshot of the entire computer screen or Shift-Command-4 ...

Malware USBCulprit: Aims devices that are not connected to a network

Did you think that devices without any connection to a local or other network (air-gapped devices) are safe? Think again! The USBCulprit malware that ...

Free Microsoft Teams: You can finally create meetings!

Users of the free version of Microsoft Teams can now create video meetings. The change, identified by ...