EVENT TICKETS
ALL TICKETS >
2025 New Year's Eve
Regular Events
Hurry! Get Your Tickets Now! Countdown has begun!!

2025 Midnight Madness NYE PARTY
Regular Events
Join us for an unforgettable night filled with glitz, glamour, and good vibes! The 2025 Midnight Madness NYE Party promises to be a night to remember with Live Music by DJ Malay

Big Fat New Year Eve 2025
Regular Events
Arizona's Largest & Hottest New Year’s Eve Event: Big Fat Bollywood Bash - Tuesday Dec 31, 2024. Tickets @ early bird pricing on sale now (limited quantity of group discount

Google rewarded $3 mn to security researchers in 2017San Francisco, Feb 9 (AZINS) Tech giant Google paid out almost $3 million to security researchers in 2017 as rewards for the vulnerabilities they found in its products and services.

Around $1.1 million each was paid for bug reports specific to Google and Android products while Chrome awards accounted for the rest of the Vulnerability Reward Program.

"We awarded researchers more than $1 million for vulnerabilities they found and reported in Google products, and a similar amount for Android as well. Combined with Chrome awards, we awarded nearly $3 million to researchers for their reports," Jan Keller, a member of Google's Vulnerability Reward Program (VRP) wrote in a blog post late on Thursday.

"We also awarded $125,000 to over 50 security researchers from all around the world through our Vulnerability Research Grants Program and $50,000 to the hard-working folks who improve the security of open-source software as part of our Patch Rewards Program," Keller added.

The largest single payment of $112,500 went to independent researcher Guang Gong for outlining an exploit chain on Pixel phones as part of the Android Security Rewards Program.

The Pixel was the only device that was not exploited during last year's annual "Mobile Pwn2Own" competition and Guang's report helped strengthen its protections further.

"Pwn2Own" is a hacking contest held annually at the CanSecWest security conference where contestants are challenged to exploit widely-used software and mobile devices with previously unknown vulnerabilities.