Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

This “contest” is called Project Zero, in which users must hack into a Nexus 6P and a Nexus 5X using only the phone numbers and associated email addresses. Additionally, the vulnerabilities discovered need to be capable of executing code on the devices remotely when an email or text message is opened. This is actually much more difficult than it sounds, and Google wants to use this contest to discover vulnerabilities and determine how they work, what their methods are, and how best to protect users from similar exploits.

All in all, it’s an attempt to improve the value and quality of the device, and Google’s trying to get users in on the action.

Google is offering prizes on a first-come, first-serve basis. Here are the prizes in descending order:

  • 1st: $200,000
  • 2nd: $100,000
  • 3rd: “at least” $50,000

Additionally, the cash prizes come with the opportunity to author a guest post on Google’s Project Zero blog.

One of the benefits of crowdsourcing this responsibility to consumers is that Google doesn’t have to pay an entire team to find a resolution or detect vulnerabilities. Google can instead take the opportunity to get a head start on fixing a large group of vulnerabilities, and the prize rewards are likely much cheaper than it would be to have an entire team scour the devices and address problems.

Voyage Technology uses a similar method to help your business overcome potential weaknesses in your IT infrastructure. This practice is called penetration testing, which analyzes your current infrastructure for vulnerabilities in your systems and network components. It’s a common preventative measure that’s designed to keep threats out and identify ways to optimize network security.

But we won’t stop there--we’ll continue to keep a close watch on your organization’s infrastructure and warn you of potential vulnerabilities that might come your way. We can remotely patch and monitor your systems so as to prevent unnecessary vulnerabilities from tripping up your organization's operations. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Miscellaneous Holiday Compliance Cloud Computing Covid-19 Gadgets Training Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Two-factor Authentication Managed Services Mobile Office Data Security Vendor Apps Tip of the week Chrome Budget Voice over Internet Protocol Mobile Device Management Apple Networking Gmail App WiFi BYOD Employer-Employee Relationship Access Control Office 365 Hacker Avoiding Downtime Conferencing Marketing Managed IT Services How To BDR HIPAA Computing Physical Security Applications Information Technology Health Help Desk Analytics Office Tips 2FA Computers Augmented Reality Retail Website Storage Password Bring Your Own Device Healthcare Operating System Big Data Router Virtual Private Network Risk Management Paperless Office Infrastructure Monitoring Customer Service Windows 11 Document Management Excel Managed IT Service Remote Workers Telephone Scam Data loss Cooperation Firewall Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring The Internet of Things End of Support Vulnerability Microsoft 365 Vendor Management Cybercrime Solutions Social Display Printer Virtual Desktop LiFi Data storage Holidays Smart Technology Hacking Data Storage Presentation Outlook Machine Learning Supply Chain Money Saving Time Video Conferencing Managed Services Provider Wireless Technology Humor Virtual Machines Professional Services Maintenance Antivirus Sports Downloads Mouse Licensing Word iPhone Entertainment Administration Vulnerabilities Data Privacy Robot Images 101 Telephone System Safety Cost Management Multi-Factor Authentication Settings Mobility Wireless Printing Content Filtering IT Management VPN YouTube Meetings Employees Cryptocurrency Integration User Tip Modem Computer Repair Mobile Security Processor Customer Relationship Management Virtual Assistant Outsource IT Monitors Cyber Monday Google Wallet Proxy Server Surveillance Cookies Tactics Virtual Machine Environment Hotspot Competition Media Reviews Windows 8 Laptop Websites Mirgation Medical IT Transportation Small Businesses Drones Development Nanotechnology Addiction Hypervisor Displays Electronic Medical Records Language SharePoint User Shopping Management Optimization Halloween Chatbots PowerPoint Employer/Employee Relationships Outsourcing Writing Distributed Denial of Service Lenovo Screen Reader PCI DSS Service Level Agreement Virtual Reality Computing Infrastructure Navigation Gig Economy Hacks Server Management Scary Stories Private Cloud Identity IP Address Workplace Teamwork Hiring/Firing Fun Superfish Bookmark Internet Service Provider Identity Theft Smart Tech Regulations Compliance Deep Learning Download Twitter Alerts Evernote Paperless Recovery Memes Error Co-managed IT SQL Server Technology Care Social Engineering Break Fix Hard Drives Browsers Net Neutrality Education Connectivity Financial Data Upload History Remote Computing Domains Business Communications Smartwatch Mobile Computing Social Network IT Scams Multi-Factor Security Azure Hybrid Work Search Dark Web Refrigeration Procurement Tablet IoT Telework Best Practice Trends Cyber security Alert Public Speaking Tech Human Resources CES Managed IT Customer Resource management Communitications Buisness File Sharing Regulations Lithium-ion battery Cables Dark Data Google Calendar IT solutions Star Wars How To Microsoft Excel Entrepreneur Legal Data Analysis Supply Chain Management FinTech Business Growth Gamification Notifications Staff Term Google Apps Legislation IT Assessment Travel Social Networking IT Maintenance Google Maps Value Business Intelligence Cortana Undo Techology Fileless Malware Flexibility Organization Alt Codes Content Wearable Technology Shortcuts Comparison Digital Security Cameras Health IT Smart Devices Downtime Unified Threat Management Motherboard Ransmoware Remote Working Hosted Solution Assessment Memory Vendors Permissions Unified Threat Management Directions Typing Data Breach Google Play Be Proactive Workforce Network Congestion Specifications Application Videos Electronic Health Records Internet Exlporer Wasting Time Threats Knowledge Fraud Google Drive User Error Microchip Username Trend Micro IBM Security Cameras Workplace Strategies Meta 5G Black Friday Software as a Service Point of Sale Unified Communications Database Managing Costs Amazon Experience Google Docs Bitcoin Network Management eCommerce Running Cable Tech Support IT Technicians SSID

Blog Archive