DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

How Google Rewards its Bounty Hunters

DigitalCIO Bureau by DigitalCIO Bureau
November 25, 2019
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Recently, Google threw a challenge for bounty hunters to find exploits in Pixel Titan M chip. Read on to know more…

Google’s Android bounty program reward has just shot up. Recently, Google threw a challenge for bounty hunters to find exploits in Pixel Titan M chip. Google expects the bounty hunters to look for a full chain remote code execution exploit with persistence, which compromises Titan M on Pixel devices.

Google’s Bounty Program
Google’s bounty program was created in 2015 and until now, it has paid out over $4 million for more than 1,800 vulnerabilities reported since. The single highest reward, however, was over $200,000 in the current year. Google payouts totaled over $1.5 million during the last year.

Casey Ellis, founder and CTO of Bugcrowd, said Google’s bounty has risen because “the skills needed to find these types of vulnerabilities in Google devices are rare and often tied up in the offensive market.” “By upping the incentive to hackers, Google is making bug hunting for them more attractive, especially to those that might teeter the line between whitehat and blackhat,” Ellise told Silicon Angle.

Why the Challenge
Titan M, a custom-built security chip for Pixel 3, cordons off smartphone’s most sensitive data from its main processor in order to protect it against certain attacks. Titan M helps the bootloader — a piece of code that runs before any operating system runs (Android in this case) — ensure the right version of Android on the phone. It does it by saving the last known safe Android version while preventing bad actors from driving the device back to an older, which could be a potentially vulnerable version of Android.

The attacker cannot unlock the bootloader with Titan M in place. It also verifies the lock screen passcode and it is built with insider attack resistance to prevent tampering.

The Reward
In the recent announcement, Google declared that it will now offer significantly higher rewards through its Android Security Rewards program. If anyone manages to exploit its Titan M chip on Pixel devices, Google will reward up to over a million to the individual. Top reward will be up to $1 million for a Pixel Titan M exploit with full chain remote code execution and persistence on the device. There will also be a 50 percent bonus if the exploit chain works on developer preview versions of Android.

Further, white hat hackers can now earn up to $500,000 in several other categories such as for exfiltrating data secured by Titan M chip and $100,000 for lock screen bypass techniques.

Other Reward Programs
Zerodium, a leading exploit acquisition platform that claims to provide its services mainly to government organizations, is currently offering up to $2.5 million for an Android exploit chain with persistence and requires no clicks. It pays up to $2 million for an iOS exploit chain that requires one click and offers persistence on the device and $1 Million for chat app exploits affecting WhatsApp, iMessage, or SMS/MMS applications.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Gartner: Global AI Spending Will Total $1.5 Trillion In 2025

by DigitalCIO Bureau
September 17, 2025
0

Worldwide spending on AI is forecast to total nearly $1.5 trillion in 2025 according to research firm Gartner. "The forecast assumes continued investment in AI infrastructure expansion, as...

Read moreDetails

Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

by DigitalCIO Bureau
September 1, 2025
0
Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

Qlik has announced growing enterprise adoption of Qlik Answers, as companies across sectors move beyond AI prototypes and into business-critical deployment. Built for real-world complexity, Qlik Answers allows organizations to extract intelligence...

Read moreDetails

Google’s AI bug finder has found 20 vulnerabilities

by DigitalCIO Bureau
August 6, 2025
0
Kaspersky Unveils Guidelines For Secure AI Deployment At IGF 2024

Google has found and reported twenty vulnerabilities in various popular open-source projects through an AI-powered bug finder. The "researcher," dubbed Big Sleep, was introduced in November last year....

Read moreDetails

Qlik Cloud Analytics available through AWS Marketplace

by DigitalCIO Bureau
July 21, 2025
0
Qlik Cloud Analytics available through AWS Marketplace

Qlik has announced the availability of Qlik Cloud Analytics in the new AI Agents and Tools category of AWS Marketplace. Customers can now use AWS Marketplace to easily...

Read moreDetails

KnowBe4 Releases AI-Driven Prevent To Tackle Outbound Email Risk

by DigitalCIO Bureau
July 19, 2025
0
Barracuda Networks Updates Email Security Suite

KnowBe4 has announced the release of KnowBe4 Prevent across all market segments – an AI-driven email security product designed to enable organizations to manage the problem of outbound...

Read moreDetails
Next Post

IceWarp Announces Strategic Partnership with Pentagon Systems

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Coforge and Newgen Elevates Partnership

NTT DATA And Rubrik Expand Partnership

March 25, 2025
AMD Unveils New AI PC Portfolio At CES 2025

AMD Unveils New AI PC Portfolio At CES 2025

January 9, 2025
Kaspersky Discovers New Mandrake Campaign With Over 32,000 Installs On Google Play

Kaspersky Discovers New Mandrake Campaign With Over 32,000 Installs On Google Play

August 5, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?