Google is increasing the amount of money itâ€™s willing to pay to security researchers, hackers and others who find security holes in the search giantâ€™s products.
Now people who find flaws or bugsâ€”and report them to Google rather than sell them on the marketâ€”can get up to $20,000, a significant jump over the money that was being rewarded before as part of the Vulnerability Reward Program.
Google has had the bounty program in place since November 2010, and according to an April 23 post on the companyâ€™s Online Security Blog, has paid out about $460,000 for more than 780 vulnerability reports â€œthat span across the hundreds of Google-developed services, as well as the software written by 50 or so companies that we have acquired.â€
The $20,000 would be a significant increase over the previous maximum payout of $3,133.70 that Google announced last summer.
â€œWeâ€™re confident beyond any doubt the program has made Google users safer,â€ Adam Mein and Michal Zalewski, members of Googleâ€™s security team, wrote in the blog post.
The new maximum payout also comes with updated rules, Mein and Zalewski said. Getting the $20,000 will mean finding malware that would enable remote code execution on Googleâ€™s product systems, according to the new rules. People will receive $10,000 for SQL injection and equivalent vulnerabilities and for â€œcertain types of information disclosure, authentication and authorization bypass bugs,â€ they said.
The maximum for XSS, XSRF and other high-impact flaws in sensitive applications will still fetch up to $3.133.70.
Google also is rewarding more money for vulnerabilities found on products and services that pose the greatest risk of exposure for the companyâ€™s customers.
â€œFor example, while every flaw deserves appropriate attention, we are likely to issue a higher reward for a cross-site scripting vulnerability in Google Wallet than one in Google Art Project, where the potential risk to user data is significantly smaller,â€ Mien and Zalewski wrote.
There are some exceptions, according to the programâ€™s rules. Client applications, such as Android, Picasa and Google Desktop, are not included, though they may be in the future. In addition, for companies bought by Google, for the first six months after the acquisition, those companiesâ€™ vulnerabilities will not qualify for rewards.
Paying bounties to security researchers and hackers to find security holesâ€”and help fix themâ€”is not unusual among software vendors. Google has been doing it for more than a year, and Adobe started a similar program in late 2010.
In addition, Google has created a contest called Pwnium that challenges hacker and security pros to find flaws in its products. Last month, Google paid out tens of thousands of dollarsâ€”including $60,000 to two peopleâ€”for finding flaws in its Chrome browser.
However, the money Google is willing to pay out to people to find flaws pales in comparison to what those vulnerabilities would fetch on the open market. In an article in Forbes.com, some hacking techniques can fetch more than $100,000 from government agencies, which then use the technique to secretly spy on system users.