Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Taking These 50 Objects Out of Orbit Would Cut Danger From Space Junk in Half

    October 14, 2025

    Google gadgets, ranked

    October 14, 2025

    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    October 14, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Arc browser adds security bulletins and bug bounties
    News

    Arc browser adds security bulletins and bug bounties

    News RoomBy News RoomSeptember 27, 20242 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Arc creator The Browser Company has officially started a bug bounty program to keep its growing Chromium-based browser’s security in check. The company is also launching a new security bulletin to maintain “transparent and proactive communication” with users and researchers on bug fixes and reports.

    These security revisions followed a devastating bug a researcher found and reported to the company that would’ve allowed bad actors to insert arbitrary code into anyone’s browser just by knowing their easily findable user ID.

    The problem lived inside the Arc Boosts feature that lets you customize any website with CSS and Javascript. On top of its initial mitigations, the company says it now has disabled Boosts with Javascript by default and added a new global toggle to turn Boosts off completely in Arc version 1.61.2.

    The researcher, known as xyz3va, was initially paid a $2,000 bounty for the information. Now, with the new program in place, The Browser Company is upping it to $20,000 retroactively. The vulnerability was patched on August 26th.

    With the new program, security researchers can submit reports and get rewards based on the bug’s severity. Low severity findings that are “limited scope” or “hard to exploit” could land up to $500, Medium gets up to $2,500, High up to $10,000, and Critical earns the $20,000 ceiling.

    The blog post also outlined new practices to find other vulnerabilities, like development guidelines with additional code reviews, adding security-specific code audits, and hiring new staff for the security engineering team.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleOpenAI was a research lab — now it’s just another tech company
    Next Article The messy WordPress drama, explained

    Related Posts

    Google gadgets, ranked

    October 14, 2025

    Facebook removes ICE-tracking page after US government ‘outreach’

    October 14, 2025

    Apple teases M5 MacBook

    October 14, 2025

    Motorola has a super-thin Air phone too

    October 14, 2025

    Discord blamed a vendor for its data breach — now the vendor says it was ‘not hacked’

    October 14, 2025

    California cracks down on ‘predatory’ early cancellation fees

    October 14, 2025
    Our Picks

    Google gadgets, ranked

    October 14, 2025

    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    October 14, 2025

    Facebook removes ICE-tracking page after US government ‘outreach’

    October 14, 2025

    Mark Cuban Would Still Have Dinner With Donald Trump

    October 14, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Apple teases M5 MacBook

    By News RoomOctober 14, 2025

    Apple is teasing the imminent launch of a new MacBook with an M5 chip. In…

    The Mystery of How Quasicrystals Form

    October 14, 2025

    Motorola has a super-thin Air phone too

    October 14, 2025

    Programming in Assembly Is Brutal, Beautiful, and Maybe Even a Path to Better AI

    October 14, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.