Google expands bug bounty program, ups Patch rewards
Researchers who analyze Google-made extensions should be rewarded, the company said
IDG News Service - Google is broadening its bug bounty program for security researchers to encompass all Chrome apps and extensions made by company. It's also upping payments for its Patch Rewards Program, focused on improvements for open-source code.
The company pays independent researchers for finding problems such as cross-site scripting flaws, SQL injection or authentication problems under its Vulnerability Reward Program, which started in November 2010.
Many applications and extensions for its Chrome browser come from third-party developers, but Google also develops many itself.
"We think developing Chrome extensions securely is relatively easy (given our security guidelines are followed), but given that extensions like Hangouts and GMail are widely used, we want to make sure efforts to keep them secure are rewarded accordingly," wrote Eduardo Vela Nava and Michal Zalewski of Google's Security Team, in a blog post.
The company is also upping the payouts for qualifying code improvements under its Patch Rewards Program, which focuses on some of the most widely used open-source programs. It was launched in October 2013.
The previous range for rewards was between $500 to $3,133.7. Now that range will apply to "submissions that are very simple or that offer only fairly speculative gains," Nava and Zalewski wrote.
Google will offer $5,000 for moderately complex patches that provide convincing security benefits, and $10,000 for complicated improvements that prevent major vulnerabilities in the code.
"We look forward to ongoing collaboration with the broader security community, and we'll continue to invest in these programs to help make the Internet a safer place for everyone," they wrote.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Malware and Vulnerabilities White Papers | Webcasts