Google Pays $ Million to Hackers Finding Vulnerabilities in 2020

Google Paid $ 6.7 Million to Hackers and Researchers Finding Vulnerabilities in 2020. As you probably are aware, Google makes an installment as a prize to the individuals who discover the weaknesses and blunders in their administrations, for example, Android, Chrome and Google Pay and offer answers for them. The sum paid by the organization for this in 2020 is 6.7 million dollars.

Google has likewise made its shoppers a piece of improving its administrations with a blunder reward program it dispatched in 2010. With this program, individuals who discover weaknesses and blunders in Google applications are remunerated with an installment that changes as indicated by the mistake they find and the arrangement they give.

Truth be told, it is conceivable to see comparative applications in practically all innovation organizations. For instance, we frequently see Apple’s name in news, for example, ‘The honor for the young fellow who discovers Apple’s shortage’. However, one key distinction from Google is that it has been clarifying the amount it has paid these individuals altogether for various years under this program.

The total amount paid in Google 2020 is $ 6.7 million:


Google reported that in 2020, it paid a total of $ 6.7 million to about 662 people from 62 different countries. The most paid application with the most mistakes and deficits was Chrome. Google paid a total of $ 2.1 million in 2020 to those who found Chrome’s vulnerabilities.

At the same time, the amount paid by Google, which has to pay a lot for Android vulnerabilities, is 1.74 million dollars. A total of 270 thousand dollars was paid for Google Pay. According to the company’s statement last year, Google has paid a total of $ 21 million since the program began.

On the one hand, Google pays millions of dollars each year to universities for the research to be carried out and for their work that will increase their reputation.

Google says it’s too easy for hackers to find new security flaws

In December 2018, analysts at Google recognized a gathering of programmers with their sights set on Microsoft’s Internet Explorer. Despite the fact that new improvement was closed down two years sooner, it’s a particularly regular program that on the off chance that you can figure out how to hack it, you have a possible open way to billions of PCs.

The programmers were chasing for, and finding, beforehand obscure blemishes, known as zero-day weaknesses.

Not long after they were detected, the scientists saw one adventure being utilized in nature. Microsoft gave a fix and fixed the defect, kind of. In September 2019, another comparable weakness was found being misused by the equivalent hacking gathering.

More disclosures in November 2019, January 2020, and April 2020 amounted to in any event five zero-day weaknesses being misused from a similar bug class quite expeditiously. Microsoft gave various security refreshes: some neglected to really fix the weakness being focused on, while others required just slight changes that necessary simply a line or two to change in the programmer’s code to make the adventure work once more.

Comments are closed.