Monday, January 22, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Opera Mobile Browsers Introduce Bitcoin Mining Protection
Amazon Store Let's You Walk Away Without Checking out
Facebook Admits it Could Harm Democracy
Facebook to Open Digital Training Hubs in Europe
U.S. ITC to Probe Samsung, SK Hynix, Lenovo Over SSDs
LG Won't Showcase New G Series Smartphone at MWC
Toshiba May Seek For an IPO For Its Memory Unit
Facebook to Prioritize "Trustworthy" News
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Google ...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, August 16, 2012
Google To Offers $2M Prize To Chrome Hackers


Google said it will pay up to $2 million for major vulnerabilities in its Chrome browser at a second Pwnium hacking contest this fall.

Pwn2Own, a rival contest sponsored by Hewlett-Packard, will award as much as $200,000 in a mobile-specific challenge slated to run several weeks earlier.

Google's Pwnium 2 will take place at the Hack In The Box security conference on Oct. 10 in Kuala Lumpur, Malaysia.

This time, Google will be sponsoring up to $2 million worth of rewards at the following reward levels:

- $60,000: "Full Chrome exploit": Chrome / Win7 local OS user account persistence using only bugs in Chrome itself.
- $50,000: "Partial Chrome exploit": Chrome / Win7 local OS user account persistence using at least one bug in Chrome itself, plus other bugs. For example, a WebKit bug combined with a Windows kernel bug.
- $40,000: "Non-Chrome exploit": Flash / Windows / other. Chrome / Win7 local OS user account persistence that does not use bugs in Chrome. For example, bugs in one or more of Flash, Windows or a driver.
- $Panel decision: "Incomplete exploit": An exploit that is not reliable, or an incomplete exploit chain.

Exploits should be demonstrated against the latest stable version of Chrome. Chrome and the underlying operating system and drivers will be fully patched and running on an Acer Aspire V5-571-6869 laptop (which Google will be giving away to the best entry.) Exploits should be served from a password-authenticated and HTTPS Google property, such as App Engine. The bugs used must be novel i.e. not known to us or fixed on trunk. Please document the exploit.


Previous
Next
Graphics Shipments in Q2 Increased 2.5% Over Last Quarter        All News        MPEG Issues New H.265 Video Compression Draft
Samsung and Osram Reach Settlement over LED Patent Suits     General Computing News      MPEG Issues New H.265 Video Compression Draft

Get RSS feed Easy Print E-Mail this Message

Related News
Google Signs Patent Agreement with Tencent
Google Expands Global Cloud Infrastructure With New Regions and Subsea Cables
Google Removes Gaming Apps with Porn Malware
Is Your Chromebook Vulnerable to Meltdown? Find out Here
Google Assistant Goes to Smart Displays, Cars
Google Brings All Paying Forms Under the Google Pay Brand
Google Reportedly Shielded 16 Billion Euros From Tax
Google to Shut Down Project Tango in March 2018
Google's Year in Search
Google Introduces three New Photo Apps
Google Enhances Chrome Browser Security for Enterprise Users
Google Removes YouTube From Amazon Devices

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .