SlideShare a Scribd company logo
1 of 2
Google Chrome: Hack Me If Ya Can!




In a move that I thought was brave, and pretty damn cool, Google invited hackers to try to hack
Chrome. Great idea. Now that’s its a challenge, you’ll have some of the brightest minds helping
you to expose holes in your browser. Well a winner was announced last week and it’s a great
start for Google’s Chrome browser who looks to overtake Internet Explorer as the top browser
choice worldwide.



Sundar Pichai writes on Google+,



“Congrats to long-time Chromium contributor Sergey Glazunov who just submitted our first
Pwnium entry. Looks like it qualifies as a “Full Chrome” exploit, qualifying for a $60k reward.
We’re working fast on a fix that we’ll push via auto-update. This is exciting; we launched
Pwnium this year to encourage the security community to submit exploits for us to help make the
web safer. We look forward to any additional submissions to make Chrome even stronger for our
users.”



In an article from CNET,
“In an interview published by CNET sister site ZDNet, Justin Schuh of the Chrome security team
said that Glazunov was able to execute “code with full permission of the logged-on user.” Schuh
called the feat “impressive,” and said that it deserved the $60,000 bounty.



Glazunov is the first person to win cash from Google’s Pwnium competition. The company
launched the contest in late February with promises of awarding up to $1 million to those who
can find security holes in Chrome. The highest $60,000 prize is given only to those who can
obtain “Chrome/Windows 7 local OS user account persistence using only bugs in Chrome itself.”
A $40,000 prize will be awarded to individuals who can target Chrome with one of its own bugs,
plus others found in the operating system. Google’s $20,000 award is given to those who can
find issues without using bugs in Chrome.



“We require each set of exploit bugs to be reliable, fully functional end to end, disjoint, of
critical impact, present in the latest versions and genuinely ’0-day,’ i.e. not known to us or
previously shared with third parties,” Google wrote in its blog announcing the contest.
“Contestant’s exploits must be submitted to and judged by Google before being submitted
anywhere else.”



That’s pretty damn cool because if you look at it from the outside, the hackers are coming from a
place of let me try to get in. The security team is trying to keep people out. What’s really cool is
that you’re getting great minds that are thinking in different playing fields working towards a
common goal. Plus, it gets the community involved. Google has always been about “being
nice”, so this is a way to be nice and let everyone in on some fun. Security is going to be huge
moving forward, especially with e-commerce booming, hackers are more determined than ever
to steal cards and hack accounts. Thank goodness that Google has the stones to say, “Ok, we
built it, now come and try to get in. In fact, we’ll pay you if you can.” Google, I tip my hat to
thee.



About WheresBigFoot: WheresBigFoot is a part of Global Internet Marketing Company
specializing in SEO web marketing and Pay per Click Advertising. Sign up an account today to
advertise your website. Learn more about WheresBigFoot by visiting us at Advertising Pay per
Click, PPC Search and Search Advertising

More Related Content

Viewers also liked

Contemporary 1 And 2
Contemporary 1 And 2Contemporary 1 And 2
Contemporary 1 And 2zukodolls
 
Gewinner #IberiaCities Alemania
Gewinner #IberiaCities Alemania Gewinner #IberiaCities Alemania
Gewinner #IberiaCities Alemania Iberia
 
Las marca no es el logo. Se trata de contar historias que conecten emocionalm...
Las marca no es el logo. Se trata de contar historias que conecten emocionalm...Las marca no es el logo. Se trata de contar historias que conecten emocionalm...
Las marca no es el logo. Se trata de contar historias que conecten emocionalm...Carlos Ambía
 
Fondo eventos xiv congreso de antropología
Fondo eventos xiv congreso de antropologíaFondo eventos xiv congreso de antropología
Fondo eventos xiv congreso de antropologíaBraulio Angulo
 
Cotización aviatur agosto 6-2012
Cotización aviatur  agosto 6-2012Cotización aviatur  agosto 6-2012
Cotización aviatur agosto 6-2012Braulio Angulo
 
GadgetGadgets, Como seguir un blog y Como darse de baja de un blog
GadgetGadgets, Como seguir un blog y Como darse de baja de un blogGadgetGadgets, Como seguir un blog y Como darse de baja de un blog
GadgetGadgets, Como seguir un blog y Como darse de baja de un blogLady Mendez
 
Nuevo presentación de microsoft office power point
Nuevo presentación de microsoft office power pointNuevo presentación de microsoft office power point
Nuevo presentación de microsoft office power pointjhonatan12353
 
Markus Greitemann, Patrick Honecker: Kommunikation neuer Hochschulgebäude
Markus Greitemann, Patrick Honecker: Kommunikation neuer HochschulgebäudeMarkus Greitemann, Patrick Honecker: Kommunikation neuer Hochschulgebäude
Markus Greitemann, Patrick Honecker: Kommunikation neuer HochschulgebäudeStefanie Kollenberg, Raabe Verlag
 
Bloque de cierre jisell zambrano
Bloque de cierre jisell zambranoBloque de cierre jisell zambrano
Bloque de cierre jisell zambranojisellzg
 
How does my magazine represent certain social groups
How does my magazine represent certain social groupsHow does my magazine represent certain social groups
How does my magazine represent certain social groupsLucaabraham
 

Viewers also liked (17)

Contemporary 1 And 2
Contemporary 1 And 2Contemporary 1 And 2
Contemporary 1 And 2
 
Merger of night day
Merger of night   dayMerger of night   day
Merger of night day
 
Gewinner #IberiaCities Alemania
Gewinner #IberiaCities Alemania Gewinner #IberiaCities Alemania
Gewinner #IberiaCities Alemania
 
Las marca no es el logo. Se trata de contar historias que conecten emocionalm...
Las marca no es el logo. Se trata de contar historias que conecten emocionalm...Las marca no es el logo. Se trata de contar historias que conecten emocionalm...
Las marca no es el logo. Se trata de contar historias que conecten emocionalm...
 
Fondo eventos xiv congreso de antropología
Fondo eventos xiv congreso de antropologíaFondo eventos xiv congreso de antropología
Fondo eventos xiv congreso de antropología
 
Cotización aviatur agosto 6-2012
Cotización aviatur  agosto 6-2012Cotización aviatur  agosto 6-2012
Cotización aviatur agosto 6-2012
 
GadgetGadgets, Como seguir un blog y Como darse de baja de un blog
GadgetGadgets, Como seguir un blog y Como darse de baja de un blogGadgetGadgets, Como seguir un blog y Como darse de baja de un blog
GadgetGadgets, Como seguir un blog y Como darse de baja de un blog
 
Nuevo presentación de microsoft office power point
Nuevo presentación de microsoft office power pointNuevo presentación de microsoft office power point
Nuevo presentación de microsoft office power point
 
Luis
LuisLuis
Luis
 
Avales
AvalesAvales
Avales
 
Markus Greitemann, Patrick Honecker: Kommunikation neuer Hochschulgebäude
Markus Greitemann, Patrick Honecker: Kommunikation neuer HochschulgebäudeMarkus Greitemann, Patrick Honecker: Kommunikation neuer Hochschulgebäude
Markus Greitemann, Patrick Honecker: Kommunikation neuer Hochschulgebäude
 
Lição nº 76
Lição nº 76Lição nº 76
Lição nº 76
 
La gota manola
La gota manolaLa gota manola
La gota manola
 
Bloque de cierre jisell zambrano
Bloque de cierre jisell zambranoBloque de cierre jisell zambrano
Bloque de cierre jisell zambrano
 
Franz Miller: Pressesprecher als Beruf
Franz Miller: Pressesprecher als BerufFranz Miller: Pressesprecher als Beruf
Franz Miller: Pressesprecher als Beruf
 
How does my magazine represent certain social groups
How does my magazine represent certain social groupsHow does my magazine represent certain social groups
How does my magazine represent certain social groups
 
Tarefa 2.Docx
Tarefa 2.DocxTarefa 2.Docx
Tarefa 2.Docx
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Google chrome hack me if ya can!

  • 1. Google Chrome: Hack Me If Ya Can! In a move that I thought was brave, and pretty damn cool, Google invited hackers to try to hack Chrome. Great idea. Now that’s its a challenge, you’ll have some of the brightest minds helping you to expose holes in your browser. Well a winner was announced last week and it’s a great start for Google’s Chrome browser who looks to overtake Internet Explorer as the top browser choice worldwide. Sundar Pichai writes on Google+, “Congrats to long-time Chromium contributor Sergey Glazunov who just submitted our first Pwnium entry. Looks like it qualifies as a “Full Chrome” exploit, qualifying for a $60k reward. We’re working fast on a fix that we’ll push via auto-update. This is exciting; we launched Pwnium this year to encourage the security community to submit exploits for us to help make the web safer. We look forward to any additional submissions to make Chrome even stronger for our users.” In an article from CNET,
  • 2. “In an interview published by CNET sister site ZDNet, Justin Schuh of the Chrome security team said that Glazunov was able to execute “code with full permission of the logged-on user.” Schuh called the feat “impressive,” and said that it deserved the $60,000 bounty. Glazunov is the first person to win cash from Google’s Pwnium competition. The company launched the contest in late February with promises of awarding up to $1 million to those who can find security holes in Chrome. The highest $60,000 prize is given only to those who can obtain “Chrome/Windows 7 local OS user account persistence using only bugs in Chrome itself.” A $40,000 prize will be awarded to individuals who can target Chrome with one of its own bugs, plus others found in the operating system. Google’s $20,000 award is given to those who can find issues without using bugs in Chrome. “We require each set of exploit bugs to be reliable, fully functional end to end, disjoint, of critical impact, present in the latest versions and genuinely ’0-day,’ i.e. not known to us or previously shared with third parties,” Google wrote in its blog announcing the contest. “Contestant’s exploits must be submitted to and judged by Google before being submitted anywhere else.” That’s pretty damn cool because if you look at it from the outside, the hackers are coming from a place of let me try to get in. The security team is trying to keep people out. What’s really cool is that you’re getting great minds that are thinking in different playing fields working towards a common goal. Plus, it gets the community involved. Google has always been about “being nice”, so this is a way to be nice and let everyone in on some fun. Security is going to be huge moving forward, especially with e-commerce booming, hackers are more determined than ever to steal cards and hack accounts. Thank goodness that Google has the stones to say, “Ok, we built it, now come and try to get in. In fact, we’ll pay you if you can.” Google, I tip my hat to thee. About WheresBigFoot: WheresBigFoot is a part of Global Internet Marketing Company specializing in SEO web marketing and Pay per Click Advertising. Sign up an account today to advertise your website. Learn more about WheresBigFoot by visiting us at Advertising Pay per Click, PPC Search and Search Advertising