Security Blog

The latest news and insights from Google on security and safety on the Internet

Spurring more vulnerability research through increased rewards

23 tháng 4, 2012
Share on Twitter Share on Facebook
Google

8 nhận xét :

Nặc danh nói...

Stand alone vulerabilities, aren't as in demand as custom built attacks. Eg: Stuxnet

---

Andrew Wallace

Independent consultant

http://www.n3td3v.org.uk/

lúc 17:49 23 tháng 4, 2012
AB5NI nói...

So, do we get a "get out of jail free" card if we start trying to hack google to find these vulnerabilities, and do we have to register somewhere so u guys know it's just us trying to win a prize and not actually attack ur sites/code, or are u encouraging us to attack your services -- no holds barred? :D

I'm a bit rusty on some of this stuff because of working on other projects, etc., and I'm wondering what kind of resources you guys are going to be providing to help us get our feet wet again? Any chance of some youtube videos and "Hack Google 101" blog enteries, or are we pretty much on our own?

Anyway, thank u very much for the new offer, guys/google, and I think I found a new "hobby." :D.

Randall Jouett
Amateur Radio: AB5NI

lúc 18:47 24 tháng 4, 2012
McFred nói...

Would be great to explain what they are looking for in a mainstream language that non technical user can understand to make the flaw's hunt fairer to anyone. Also, Google have probably specific flaw they are looking for and rewarding $20000 will be at reach of the most perverting flaw for the most technical genius who already know programming. This reducing the amount of people who can report google's flaw to google team ;-) Cunning!

lúc 03:46 25 tháng 4, 2012
AB5NI nói...

@McFred

Not too sure this would ever be doable by the non-technical community. Doing something like this will require years of study, familiarity with system and various OS architectures and instruction sets, XSS, SQL Injection and the use of an interactive disassembler. I have this skillset, but I'm just not up to snuff on the latest, greatest techniques. Basically, this is Google's "call to arms" for the technically oriented that are staying in the background, and upping the reward will (hopefully) pull them out of the woodwork -- and Google knows this...

Overall, this is a great move by Google. It will stimulate the security market and also help to make their services much less vulnerable to attack, and that will translate into more folks using their products, such as Android and Chrome -- and that translates into more bucks for Google. Smart move on their behalf.

Randall Jouett
Amateur Radio: AB5NI

lúc 00:29 26 tháng 4, 2012
Best Business Brands nói...

Unequivocally, yes. Despite the risks, vulnerability research is enormously valuable. Security is a mindset, and looking for vulnerabilities nurtures that mindset.

lúc 10:22 1 tháng 5, 2012
Patrick Murphy nói...

While I appreciate "the hunt", can we get a waiver in writing detailing that we can actually hack Google because we're "on a mission from God"?
Pat Murphy
LPT Security Consulting

lúc 10:35 9 tháng 5, 2012
Unknown nói...

Pls which email can we report the bug to. And i got a message from dis email(vulnerabilityrewards2012@gmail.com) after reporting a bug on gmail that i am rewarded with $3133. Pls hw true is it.

lúc 06:50 18 tháng 6, 2012
Unknown nói...

So its kind of more strict I guess, the updated rules for rewards program more tougher than before..

lúc 01:02 4 tháng 9, 2012

Đăng nhận xét

  

Nhãn


  • #sharethemicincyber
  • #supplychain #security #opensource
  • AI Security
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2024
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2023
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2022
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2021
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2020
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2019
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2018
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2017
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2016
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2015
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2014
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2013
    • thg 12
    • thg 11
    • thg 10
    • thg 8
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2012
    • thg 12
    • thg 9
    • thg 8
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
    • thg 1
  •     2011
    • thg 12
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 6
    • thg 5
    • thg 4
    • thg 3
    • thg 2
  •     2010
    • thg 11
    • thg 10
    • thg 9
    • thg 8
    • thg 7
    • thg 5
    • thg 4
    • thg 3
  •     2009
    • thg 11
    • thg 10
    • thg 8
    • thg 7
    • thg 6
    • thg 3
  •     2008
    • thg 12
    • thg 11
    • thg 10
    • thg 8
    • thg 7
    • thg 5
    • thg 2
  •     2007
    • thg 11
    • thg 10
    • thg 9
    • thg 7
    • thg 6
    • thg 5

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms