Blog Posts Tagged with "Bounty"


Web Browsers, Exploits and H@x0rs… Oh, My!

November 26, 2012 Added by:Tripwire Inc

I might possibly be in the wrong business. Google announced recently that teenage hacker “Pinkie Pie” was awarded $60,000 for finding and reporting a bug in the company’s Chrome web browser. Apparently this is not even the first time he has accomplished this feat...

Comments  (0)


The Debate When it Comes to Monetizing Security Flaws

June 20, 2012 Added by:Lee Munson

Some people think that if you try to profit on your discovery, then no matter what your intentions are, the discovery could be used for non ethical goals. They think that it does not matter if it is a good guy or a bad guy who gets the information. They think that both parties have the potential for abuse...

Comments  (0)


Who Fights for the Users?

March 11, 2012 Added by:Ali-Reza Anghaie

The No More Free Bugs effort has changed the landscape by which security research is done. Before, you had one monetized market for such research - the black market. Now a new player has entered the fray - Government - and I'm not entirely sure I like where this is going...

Comments  (0)


Google Releases Vulnerability Fixes with Chrome 17.0.963.65

March 05, 2012 Added by:Headlines

Google has released Chrome 17.0.963.65 for Windows, Macintosh, Linux and Google Chrome Frame which provides fixes for multiple vulnerabilities identified may have allowed for denial-of-service (DoS) attacks or the execution of malicious arbitrary code...

Comments  (0)


Sony May Offer Bounty for Information on Hackers

May 09, 2011 Added by:Headlines

"The fact that Sony is considering a reward at all speaks to how seriously it wants the person or people who carried out the attacks that have forced its gaming services offline for nearly two weeks to face prosecution..."

Comments  (0)


Google Bounty: $20K to Hack Chrome at Pwn2Own

February 03, 2011 Added by:Headlines

Google has set a $20K bounty for the successful hacking of the Chrome browser in the Pwn2Own 2011 competition. To exploit a sandboxed program like Chrome, researchers require two vulnerabilities: The first to allow their attack code to escape the sandbox, and a second to exploit a Chrome bug...

Comments  (2)