eLearnSecurity Blog

Google Increases Bug Bounty Reward to 15000 USD

Google announced that they have tripled their bug bounty program reward to 15000 USD!

A few weeks after we posted the Microsoft 500 USD bug bounty reward article, a blog was published from the Google Online Security Blog, stating that they have increased the maximum amount by three times.

“…we’re increasing our usual reward pricing range to $500-$15,000 per bug, up from a previous published maximum of $5,000.” posted by Tim Willis of the Chrome Security Team. You can read the full article here: Fewer Bugs, Mo’ Money

Google Chrome Reward Program

chrome-bug-bounty-reward

Google increases bug bounty reward.

The Chrome Reward Program is an ongoing campaign that started in 2010 which aims to reward IT security researchers who report security bugs and issues to help make Chrome and the Chrome OS more secure. The tech giant offers monetary rewards as well as public recognition for vulnerabilities that are properly disclosed.

“It’s a matter of understanding how chrome works and how to exploit its functionalities.” Davide ‘GiRa’ Girardi, IT Security Researcher, said. “The bounty has been raised because, at the moment, chrome is getting mature, so probably any bug is a real tough one.”

Chrome is getting more secure and there are fewer bugs now compared to its initial stages, which makes finding these flaws all the more challenging. Check out the rules and FAQs of the Chrome Rewards Program here: Chrome Rewards Program Rules

Web Application Penetration Testing (WAPT)

If you want to learn how to find bugs in web applications, then start for FREE with our Web Application Penetration Testing course and understand the techniques in web app pentesting. You can download your FREE trial here: WAPT Trial

WAPT

Advanced Reverse Engineering Of Software (ARES)

Also, we have our ARES course where you will learn several methods used to identify, isolate, and analyse portions of any code. This is helpful if you want to understand and examine how software is constructed by deconstructing it so you can build a better version of it. Read more about ARES here: ARES course

ARES

So to our eLearnSecurity students, go and get yourself a bounty!

Tags: ,

0 Comments

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Go to top of page