Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybersecurity Funding

Google Puts Up $1 Million for Security Research Grants

Google has announced plans to dedicate $1,000,000 to fund grants for independent security research in 2016.

Google has announced plans to dedicate $1,000,000 to fund grants for independent security research in 2016.

In a post on the Google Drive Blog, Kevin Nelson, Product Manager for Google Drive, noted that independent security researchers have already contributed significantly Google’s data security. The newly announced funding should determine even more researchers to put effort into keep Google Drive safe.

The Internet giant is offering grants for security research on newly launched features and products, on an existing Google product considered particularly sensitive, and on recently fixed vulnerabilities in a product or Google wide. Security researchers interested in applying for a grant can find additional information on the process on Google’s dedicated webpage.

The company launched the Vulnerability Research Grants program in January of this year, which is intended to reward the time and effort security researchers spend testing Google products even when they do not end up discovering new vulnerabilities. Those who do find security holes in the company’s products are rewarded as well.

Google is already offering rewards of up to $20,000 to anyone who finds and reports a qualifying issue in its products, including Google.com, YouTube, and Blogger, and it plans on doing so the next year as well. However, only a few vulnerabilities qualify for the highest rewards, namely remote code execution bugs such as command injection, deserialization bugs, sandbox escapes.

According to Google’s reward program page, it is willing to pay up to $20,000 for issues discovered in applications that permit taking over a Google account, in highly sensitive applications, and in normal Google applications. The company also notes that vulnerabilities that allow unrestricted file system or database access and logic flaw bugs leaking or bypassing significant security controls are awarded with up to $10,000 in cash.

Last week, Google announced a series of changes in its indexing system, which will result in HTTPS pages being crawled in favor of their HTTP equivalents. The move is meant to further promote the use of the HTTPS protocol, which should provide users with increased security when browsing the Internet.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.