Google raises bounty on software bugs

Google raises bounty on software bugs
Google on Monday raised to $20,000 its bounty on software bugs that hackers could exploit for cyber attacks on the Internet giant's online services. The maximum reward for exposing a vulnerability that would let an intruder's code get up to mischief in a Google datacenter was ramped up from the $3,133.70 payout set when the bounty program launched in November of 2010.

Google on Monday raised to $20,000 its bounty on software bugs that hackers could exploit for cyber attacks on the Internet giant's online services.

The maximum reward for exposing a vulnerability that would let an intruder's code get up to mischief in a datacenter was ramped up from the $3,133.70 payout set when the bounty program launched in November of 2010.

"When we get more bug reports, we get more bug fixes," Google security team manager Adam Mein told AFP. "That is good for our users; that is good for us."

Google has paid out approximately $460,000 since it established the Vulnerability Reward Program.

Of the 11,000 software flaws reported to Google, more than 780 qualified for rewards ranging from $300 to the maximum, a figure selected because the digits translate into a technical term in a hacker programming language.

The bounty was raised to inspire software savants to hunt for difficult-to-find, and potentially perilous, bugs hidden deep in programs, according to Mein.

"We want them to know the reward is there for them if they find the most severe bugs," Mein said.

Bugs found in more sensitive services such as Google smartphone "Wallet" software tends to merit more generous rewards.

People vying for bounties have tended to be computer security professionals; honing their skills, and website operators, according to Google.


Explore further

Facebook offers rewards to security bug hunters

(c) 2012 AFP

Citation: Google raises bounty on software bugs (2012, April 23) retrieved 23 April 2019 from https://phys.org/news/2012-04-google-bounty-software-bugs.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
0 shares

Feedback to editors

User comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more