We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Google offers bounty to web bug hunters

Search giant to pay up to $3,133 for bug reports

Following up on a successful bug bounty programme that pays hackers for finding security flaws in its Chrome browser, Google now says that it will pay cash for security bugs reported on its websites.

Google calls the programme "experimental", but says it gives security researchers new incentives to report web flaws directly to Google's security team. "As well as enabling us to thank regular contributors in a new way, we hope our new program will attract new researchers and the types of reports that help make our users safer," Google said Monday in a blog posting announcing the programme.

The idea is to give Google a chance to fix the vulnerabilities before cybercriminals get their hands on them. So, in order to qualify, security researchers must privately disclose new flaws to Google first before they go public with their research. In return, the hackers qualify for cash rewards of between $500 and $3,133.70, depending on the severity of the flaw.

Google has already paid out about 50 such rewards for Chrome bugs since launching a similar programme last January. Google doesn't pay out for bugs in all of its products, however. There are no bounties for finding flaws in Android, Picasa or Google Desktop, for example.

With the web programme, Google is breaking new ground.

Web-based hacking involves experimenting with Google's own servers, rather than software that is downloaded to the researcher's computer. So people who do this work run the risk of breaking the law or possibly even disrupting Google's services while conducting their research.

To prevent those kinds of things from happening, Google offers a few guidelines about what's OK and what's not under the programme. The company won't pay for denial of service bugs - which would simply crash Google's web properties - or for bugs in the company's corporate infrastructure.

Also out are search engine optimisation tricks, bugs in Google-branded sites that are actually hosted by someone else and flaws in sites that were only recently purchased by Google.

And Google says that participants shouldn't use automated tools to search for flaws. "Please, only ever target your own account or a test account," Google said in its blog post. "Never attempt to access anyone else's data. Do not engage in any activity that bombards Google services with large numbers of requests or large volumes of data."


IDG UK Sites

Moto G2 (2014) vs Moto E comparison review: New Moto G is worth the extra cash

IDG UK Sites

Is Apple losing confidence in itself?

IDG UK Sites

The Samsung Gear VR is better than the Oculus Rift (kinda)

IDG UK Sites

How (and where) to buy an iPhone 6 or iPhone 6 Plus in the UK. Plus: What to do if you pre-ordered...