DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

How Google Rewards its Bounty Hunters

DigitalCIO Bureau by DigitalCIO Bureau
November 25, 2019
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Recently, Google threw a challenge for bounty hunters to find exploits in Pixel Titan M chip. Read on to know more…

Google’s Android bounty program reward has just shot up. Recently, Google threw a challenge for bounty hunters to find exploits in Pixel Titan M chip. Google expects the bounty hunters to look for a full chain remote code execution exploit with persistence, which compromises Titan M on Pixel devices.

Google’s Bounty Program
Google’s bounty program was created in 2015 and until now, it has paid out over $4 million for more than 1,800 vulnerabilities reported since. The single highest reward, however, was over $200,000 in the current year. Google payouts totaled over $1.5 million during the last year.

Casey Ellis, founder and CTO of Bugcrowd, said Google’s bounty has risen because “the skills needed to find these types of vulnerabilities in Google devices are rare and often tied up in the offensive market.” “By upping the incentive to hackers, Google is making bug hunting for them more attractive, especially to those that might teeter the line between whitehat and blackhat,” Ellise told Silicon Angle.

Why the Challenge
Titan M, a custom-built security chip for Pixel 3, cordons off smartphone’s most sensitive data from its main processor in order to protect it against certain attacks. Titan M helps the bootloader — a piece of code that runs before any operating system runs (Android in this case) — ensure the right version of Android on the phone. It does it by saving the last known safe Android version while preventing bad actors from driving the device back to an older, which could be a potentially vulnerable version of Android.

The attacker cannot unlock the bootloader with Titan M in place. It also verifies the lock screen passcode and it is built with insider attack resistance to prevent tampering.

The Reward
In the recent announcement, Google declared that it will now offer significantly higher rewards through its Android Security Rewards program. If anyone manages to exploit its Titan M chip on Pixel devices, Google will reward up to over a million to the individual. Top reward will be up to $1 million for a Pixel Titan M exploit with full chain remote code execution and persistence on the device. There will also be a 50 percent bonus if the exploit chain works on developer preview versions of Android.

Further, white hat hackers can now earn up to $500,000 in several other categories such as for exfiltrating data secured by Titan M chip and $100,000 for lock screen bypass techniques.

Other Reward Programs
Zerodium, a leading exploit acquisition platform that claims to provide its services mainly to government organizations, is currently offering up to $2.5 million for an Android exploit chain with persistence and requires no clicks. It pays up to $2 million for an iOS exploit chain that requires one click and offers persistence on the device and $1 Million for chat app exploits affecting WhatsApp, iMessage, or SMS/MMS applications.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

SoftBank Acquires DigitalBridge for $4 billion

by DigitalCIO Bureau
January 2, 2026
0
CRISIL To Acquire Bridge To India Energy

SoftBank Group has entered into a definitive agreement to acquire DigitalBridge Group, a leading global alternative asset manager dedicated to investing in digital infrastructure, including data centers, cell...

Read moreDetails

Barracuda Research Identifies GhostFrame Phishing Kit

by DigitalCIO Bureau
December 23, 2025
0
Barracuda Introduces ‘Barracuda Research

Barracuda has published details of a new, evasive and stealthy phishing-as-a-service (PhaaS) kit that hides its malicious content in web page iframes to bypass detection and maximise flexibility....

Read moreDetails

Arctic Wolf Snaps up UpSight Security

by DigitalCIO Bureau
November 6, 2025
0
CRISIL To Acquire Bridge To India Energy

Security company Arctic Wolf has acquired UpSight Security to enhance its Aurora Endpoint Security solution with AI-driven features for ransomware prevention and rollback recovery. Through the acquisition of UpSight Security,...

Read moreDetails

Vanguard Launches Global Technology Center in Hyderabad

by DigitalCIO Bureau
November 4, 2025
0
Vanguard Launches Global Technology Center in Hyderabad

Vanguard has launched its Global Technology Center in Hyderabad, marking a significant milestone in the firm’s technology transformation. The new office reflects Vanguard’s recognition of India as a...

Read moreDetails

Gartner: Global AI Spending Will Total $1.5 Trillion In 2025

by DigitalCIO Bureau
September 17, 2025
0

Worldwide spending on AI is forecast to total nearly $1.5 trillion in 2025 according to research firm Gartner. "The forecast assumes continued investment in AI infrastructure expansion, as...

Read moreDetails
Next Post

IceWarp Announces Strategic Partnership with Pentagon Systems

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Hexaware to Transform Software Engineering with AI-powered SDLC Solutions

Hexaware to Transform Software Engineering with AI-powered SDLC Solutions

February 26, 2026

Freelance jobs rise as firms get used to WFH

May 16, 2020
EKA Mobility, KPIT sign MoU to enhance electric powertrain technology components

EKA Mobility, KPIT sign MoU to enhance electric powertrain technology components

February 6, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?