Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Bug Bounty program for Android Apps

admin by admin
May 24, 2023
in News
A A
0

Google is well-known for its rewards for Security Researchers. A Simple XSS in any Google subdomain will reward you $1337. Google has its major focus on its Android operating system and its applications.

Android was acquired by Google in 2005 for $50 Million. Android has been generating massive revenue for Google from its Google Play services and other Android services.

All over the world Security, researchers have reported several critical bugs to various organizations, including Google, Facebook, Apple, Microsoft, etc.; these reports have prevented tens of millions of dollars from a data breach for these organizations.

Google’s Bug Bounty Program for Android has been set with a maximum reward of $15,000. This will attract a lot of security researchers to crack open the Android safe.

Qualifying Vulnerabilities

A list of vulnerabilities is being focussed by Google, which are

  • Arbitrary Code Execution (ACE)
  • Theft of Sensitive Data
  • Path Traversal
  • Intent redirections
  • Orphaned permissions
  • Unsafe usage of pending intents
  • Unauthorized access to sensitive data that are insecurely stored
  • Manipulation of insecure design to read sensitive data
  • Full control over the application
  • Malicious overwriting of .so file
  • Call exec and run arbitrary java native code etc.,

Vulnerabilities that are considered unqualified are,

  • Hardcoded API keys
  • Variants of Strandhogg
  • Attacks with a rooted device
  • Non-sensitive media access in external storage

Application Tiers

According to the Bug Bounty Program, applications are separated into tiers which will have different rewards in different tiers.

Tier 1

Name Package name
Google Play Services com.google.android.gms
AGSA com.google.android.googlequicksearchbox
Google Chrome com.android.chrome
Google Cloud com.google.android.apps.cloudconsole
Gmail com.google.android.gm
Chrome Remote Desktop com.google.chromeremotedesktop

Rewards for these Tier 1 application vulnerabilities start from $750 and go up to a maximum of $30,000.

Tier 2

Tier 2 belongs to applications that handle user data, those that interact with the Tier 1 applications in some way, or those that connect with Google services. 

Rewards for these Tier 2 application vulnerabilities start from $625 and go up to a maximum of $25,000.

Tier 3

Tier 3 applications belong to those that do not handle user data or interact with Google’s services.

Rewards for these Tier 3 application vulnerabilities start from $500 and go up to a maximum of $20,000.

For more information about the Google Bug Bounty Program, Visit Google’s Bug Hunter website.

Common Security Challenges Facing CISOs? – Download Free CISO’s Guide

EHA

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.