Hackers offered $1K to expose bugs on Google Play apps | Inquirer Technology

Hackers offered $1K to expose bugs on Google Play apps

/ 06:41 PM October 21, 2017

INQUIRER.net stock photo

Tech companies have always sought the aid of “white hackers” to expose vulnerabilities within their systems.

Google is the latest high-profile company to do so, offering  $1,000 (roughly P51,000) to anyone who can identify security breaches in participating Google Play apps.

In collaboration with bug bounty platform HackerOne, the Google Play Security Reward Program will compensate hackers who can find bugs in 13 Google Play apps including Tinder, Duolingo, Dropbox, Snapchat and Headspace.


According to Mashable, users can report vulnerabilities to the apps’ developers and be given a chance to work with them directly to fix them.

Once the bugs are fixed, the Android Security team will pay the bounty, while a separate reward will be given by the developer as well.

Furthermore, Google will collate data on all the reported breaches and will share them with other developers who may have encountered the same problems.

“Participating apps that already have a bug bounty program will now have the opportunity to attract an even more diverse set of hackers,” Adam Bacchus, HackerOne’s chief bounty officer, was quoted as saying in the report.


Currently, only the 13 apps are subject to evaluation due to their popularity, while other new apps will be opened for testing after a trial period.  Khristian Ibarrola /ra



Japanese company sues Apple for ‘Animoji’ trademark

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TOPICS: Google
TAGS: Google

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.