Sunday, June 7, 03:09
Home security Google has spent a record amount on its bug bounty program

Google has spent a record amount on its bug bounty program

bounty

When it comes to her bug bounty programs, Google is quite generous. Last year alone, the company spent $ 6,5 million as a reward to researchers who discovered vulnerabilities, almost double the $ 3,4 million it spent in 2018. The biggest reward touched $ 201.337 and was awarded to Guang Gong Alpha , who discovered a great vulnerability in Pixel 3.

Google Vulnerability Rewards Programs (VRPs) have been in existence since 2010 and are designed to reward researchers for discovering errors and faults that Google may not have realized. This program has of course been extended to other products, including Chrome and Android, while last year the company expanded its security reward range Google Playto include not only the top eight applications, but any application that has more than 100 million installations. That amount reached $ 650.000 in rewards in the second half of 2019. Overall, Google has paid more than $ 21 million since its VRPs were launched.

While this is quite a large amount, it is a perfectly normal move, since the company cannot find all the vulnerabilities that may exist in its products. Being generous with its rewards on the other hand motivates security researchers to be more efficient.

It comes as no surprise, then, that other companies have followed suit. THE Tesla gives big cash prizes - even cars - to anyone who can break a car's security system while bug bounty program Apple offers payments of up to $ 1 million. While the technology is getting into more and more areas of our daily lives and hackers As they continue to evolve their techniques, it is likely that more and more companies will adopt the bug bounties.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

Lyrics from AI technology or from people: Can you tell them apart?

While a large percentage of people can recognize when they are talking on a chatbot instead of a human operator, it seems that this is not the case ...

Technology and children: When are they ready for safe use?

Today's children and teens use various messaging apps and social media to ...

Call of Duty Black Ops Cold War: The first video leaked

The first video from the gameplay of Call of Duty 2020, which is rumored to be called Black Ops Cold War, has just been revealed.

Elon Musk: "It's time to break up Amazon"

Elon Musk intensifies the fight with Jeff Bezos with a new tweet: The General Manager of Tesla Inc., Elon Musk, said ...

Attack on America's 5G towers on Saturday!

Protests over 5G connectivity are scheduled to take place over the weekend, according to NATE. According to a recommendation that was identified ...

Windows 10 Updates: You can block them with Wu10Man!

Microsoft launched the Windows 10 update in May 2020, so it will be available on your computer soon ....

ECh0raix Ransomware: New campaign targets QNAP NAS devices!

Malicious agents behind eCh0raix Ransomware have launched a new campaign targeting QNAP NAS devices. ECh0raix was observed ...

Mac: How to change the storage location of your screenshots?

When you take screenshots on your Mac device using the Shift-Command-3 shortcut to take a screenshot of the entire computer screen or Shift-Command-4 ...

Malware USBCulprit: Aims devices that are not connected to a network

Did you think that devices without any connection to a local or other network (air-gapped devices) are safe? Think again! The USBCulprit malware that ...

Free Microsoft Teams: You can finally create meetings!

Users of the free version of Microsoft Teams can now create video meetings. The change, identified by ...