Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

This “contest” is called Project Zero, in which users must hack into a Nexus 6P and a Nexus 5X using only the phone numbers and associated email addresses. Additionally, the vulnerabilities discovered need to be capable of executing code on the devices remotely when an email or text message is opened. This is actually much more difficult than it sounds, and Google wants to use this contest to discover vulnerabilities and determine how they work, what their methods are, and how best to protect users from similar exploits.

All in all, it’s an attempt to improve the value and quality of the device, and Google’s trying to get users in on the action.

Google is offering prizes on a first-come, first-serve basis. Here are the prizes in descending order:

  • 1st: $200,000
  • 2nd: $100,000
  • 3rd: “at least” $50,000

Additionally, the cash prizes come with the opportunity to author a guest post on Google’s Project Zero blog.

One of the benefits of crowdsourcing this responsibility to consumers is that Google doesn’t have to pay an entire team to find a resolution or detect vulnerabilities. Google can instead take the opportunity to get a head start on fixing a large group of vulnerabilities, and the prize rewards are likely much cheaper than it would be to have an entire team scour the devices and address problems.

Voyage Technology uses a similar method to help your business overcome potential weaknesses in your IT infrastructure. This practice is called penetration testing, which analyzes your current infrastructure for vulnerabilities in your systems and network components. It’s a common preventative measure that’s designed to keep threats out and identify ways to optimize network security.

But we won’t stop there--we’ll continue to keep a close watch on your organization’s infrastructure and warn you of potential vulnerabilities that might come your way. We can remotely patch and monitor your systems so as to prevent unnecessary vulnerabilities from tripping up your organization's operations. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 07 May 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Microsoft Small Business Cybersecurity Passwords Communication Data Backup Smartphone Backup Saving Money Android Business Management Smartphones VoIP Upgrade Managed Service communications Mobile Devices Disaster Recovery Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Automation Facebook Artificial Intelligence Productivity Covid-19 Gadgets Cloud Computing AI Server Managed Service Provider Remote Work Miscellaneous Information Outsourced IT Holiday Encryption Employee/Employer Relationship Spam Windows 10 Office Compliance Training Data Management Government Business Continuity Business Technology Wi-Fi Windows 10 Virtualization Bandwidth Blockchain Mobile Office Two-factor Authentication Data Security Apps App Vendor Mobile Device Management Gmail Networking Managed Services Voice over Internet Protocol Chrome BYOD Budget Employer-Employee Relationship Apple Avoiding Downtime Tip of the week Marketing Applications Computing Information Technology How To BDR Office 365 WiFi Conferencing IT Support Hacker Access Control HIPAA Website Router Operating System Retail Risk Management Managed IT Services Help Desk Analytics Office Tips Big Data Augmented Reality Healthcare Storage Password Bring Your Own Device Virtual Private Network Computers Health Solutions Going Green Document Management Cybercrime Firewall Windows 11 Scam Data loss Monitoring 2FA Excel The Internet of Things Patch Management Remote Workers Save Money Social Remote Monitoring Telephone Vulnerability End of Support Vendor Management Physical Security Cooperation Free Resource Project Management Display Customer Service Windows 7 Printer Paperless Office Infrastructure Microsoft 365 Wireless Technology Machine Learning Employees Settings Wireless Integration Printing Content Filtering User Tip Word Modem YouTube Maintenance Mobile Security Processor Antivirus Holidays Cryptocurrency Data Storage Supply Chain Smart Technology Virtual Desktop Safety Video Conferencing Managed Services Provider Data storage LiFi Virtual Machines Saving Time Professional Services Outlook Robot Managed IT Service Money Humor Downloads iPhone IT Management Licensing VPN Meetings Customer Relationship Management Entertainment Vulnerabilities Sports Data Privacy Mouse Images 101 Computer Repair Administration Hacking Presentation Multi-Factor Authentication Telephone System Mobility Cost Management Content IT solutions Wearable Technology Websites Remote Working Memory Vendors Legal Data Breach Health IT Google Play Be Proactive Business Growth Motherboard Comparison Permissions Videos Electronic Medical Records IP Address Electronic Health Records Directions Workforce SharePoint Assessment Cortana Wasting Time Threats Writing Trend Micro Security Cameras Workplace Strategies Alt Codes Lenovo Specifications Downtime Fraud Virtual Reality Software as a Service Microchip Recovery Meta Internet Exlporer Managing Costs Amazon Username Hosted Solution Server Management Private Cloud Hard Drives Domains eCommerce SSID Typing Superfish Identity Theft Black Friday Twitter Surveillance Virtual Assistant Outsource IT Database Refrigeration Virtual Machine Environment Google Drive Media IT Technicians Knowledge Error Reviews Social Engineering Public Speaking Proxy Server Medical IT Cookies Cyber Monday Hotspot 5G Remote Computing Lithium-ion battery Development Transportation Small Businesses Tactics Hypervisor Displays Google Docs Entrepreneur Unified Communications Mirgation Experience Shopping Optimization PowerPoint Bitcoin Nanotechnology Running Cable Tablet Language Alert Employer/Employee Relationships Outsourcing Google Wallet Addiction Undo Management Navigation Managed IT Chatbots File Sharing PCI DSS Dark Data Gig Economy How To Workplace Windows 8 Screen Reader Laptop Distributed Denial of Service Service Level Agreement Computing Infrastructure Notifications Internet Service Provider Teamwork Hiring/Firing Drones Evernote Paperless Identity Travel Regulations Compliance Memes Bookmark Co-managed IT Techology Smart Tech Halloween Google Maps Download Alerts Net Neutrality Application SQL Server Technology Care History Business Communications Unified Threat Management Financial Data Break Fix Smartwatch IBM IT Browsers Scams Hacks Unified Threat Management Connectivity Scary Stories Upload Fun Procurement Azure Hybrid Work Cyber security Social Network Tech Human Resources Deep Learning Multi-Factor Security Telework Network Congestion Dark Web CES Communitications Cables User Error IoT Trends Education Supply Chain Management Competition Customer Resource management Term Google Apps Regulations Point of Sale Google Calendar FinTech Microsoft Excel IT Assessment Data Analysis IT Maintenance Mobile Computing Star Wars Gamification Network Management Staff Search Tech Support Flexibility Value Business Intelligence Monitors Shortcuts Best Practice Social Networking Legislation Organization Digital Security Cameras Smart Devices Fileless Malware User Ransmoware Buisness

Blog Archive