Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

A serious Tor browser flaw leaks users' real IP addresses

The so-called TorMoil flaw stems from a bug in how Firefox handles local file-based addresses.

A serious Tor browser flaw leaks users' real IP addresses

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Google: Hack Top Android Apps and Get Paid  (Read 44 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 23025
  • .: Surf Queen
    • WWW
Google: Hack Top Android Apps and Get Paid
« Reply #1 on: October 20, 2017, 08:15:15 AM »
Google: Hack Top Android Apps and Get Paid
20 October 2017, 7:30 am

Google has launched another bug bounty program, yet this time it’s not aimed only at its own apps, but also at those developed by third-party companies and published on the Play Store.

Google’s new effort is called Play Security Reward Program and calls for hackers to find remote code execution (RCE) flaws in specific popular Android applications running on Android 4.4 and newer.

For the time being, only eight different developers have been approved for the program, namely Alibaba, Dropbox, Duolingo, Headspace, Line, Mail.ru, Snapchat, and Tinder, but Google says it’s working with more app makers to expand the program.

While Google’s applications are also part of the new bug bounty program (though Google says you can submit them via the Google Vulnerability Reward Program), the company explains that submissions must include proof of concepts and demonstrate how an attacker can gain full control o... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle