A few days ago I wrote about an incredible story of a man that bought the google.com and remained its owned for a few minutes.
Sanmay Ved, a former Google employee that currently works for Amazon, was searching for available .com domains and discovered the availability of Google.com … then he bought it for only $12.
In a few seconds his inbox and Google Webmaster Tools were flooded with webmaster related messages that were confirming the ownership of the Google.com domains, a scary circumstance if we consider that Ved had access to webmaster controls for a minute. Just a few minutes and the dream vanished, Ved received an order cancellation email and was refunded by Google Domains.
How is it possible?
Google owns Google Domains and this means that the company manage all purchases of domains and it could revoke them if needed.
The story is not ended, after acknowledging the problem Google rewarded Ved with an unknown amount of cash.
And this is the part of the story that I love, Sanmay Ved asked Google to donate his prize money to charity.
Great decision, my dear! Then Google decided to double the reward. Ved did not disclose the exact sum of cash Google had awarded him, but he confirmed that the overall amount was more than of $10,000.
Google Rewarded Ved with More than $10,000 and below the declaration that the generous man released in an interview with Business Insider.
“I don’t care about the money. It was never about the money,” Ved told Business Insider. “I also want to set an example that it’s people who want to find bugs that it’s not always about the money.”
Ved donated his reward to “The Art of Living India,” an Indian non-governmental organization involved in humanitarian projects with a special focus on stress elimination.
Great story!
(Security Affairs – Google.com, Charity)
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.