Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Google pays millions in bug bounties in exchange for vulnerability data.
The ongoing threat to users of Google’s products and services is laid bare by reports of zero-day attacks against Android smartphone users, multiple vulnerabilities targeting Chrome every month, sophisticated browser syncjacking attacks, and more. Google is, of course, fighting back. From the ditching of SMS codes as an insecure authentication method for millions, to introducing enhanced attack protection for billions. One area that might come as a surprise, however, is that Google is also paying people for hacking those products and services, and paying them a lot. How much? How does $11.8 million in 2024 grab you? Here’s why that’s a very good thing indeed.
As an old hacker myself, if I wasn’t very happy writing about cybersecurity these days with the odd bit of legal hackery thrown in for my clients, I have to say my perfect job would be that of the bug bounty hacker. I mean, you get to hack some of the biggest technology names out there, and they don’t come much bigger than Google, totally legally and get paid for it. This is the bit where I throw in the “hacking is not a crime” reminder. Only criminal hacking is a crime, and not all hackers are criminals. Sure, there’s a thriving trade in selling hacked data on the dark web, but those who hack legally, security researchers and bug bounty hunters looking for vulnerabilities in hardware and software, platforms and services, are also making the big bucks but without the threat of jail time hanging over their heads.
In a Google security blog posting published March 7, Dirk Göhmann, a technical writer at Google, confirmed that, during 2024, Google had “awarded just shy of $12 million to over 600 researchers based in countries around the globe.” For hacking Google. I’d recommend reading the entire posting for all the details, but here are the highlights: