Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

This “contest” is called Project Zero, in which users must hack into a Nexus 6P and a Nexus 5X using only the phone numbers and associated email addresses. Additionally, the vulnerabilities discovered need to be capable of executing code on the devices remotely when an email or text message is opened. This is actually much more difficult than it sounds, and Google wants to use this contest to discover vulnerabilities and determine how they work, what their methods are, and how best to protect users from similar exploits.

All in all, it’s an attempt to improve the value and quality of the device, and Google’s trying to get users in on the action.

Google is offering prizes on a first-come, first-serve basis. Here are the prizes in descending order:

  • 1st: $200,000
  • 2nd: $100,000
  • 3rd: “at least” $50,000

Additionally, the cash prizes come with the opportunity to author a guest post on Google’s Project Zero blog.

One of the benefits of crowdsourcing this responsibility to consumers is that Google doesn’t have to pay an entire team to find a resolution or detect vulnerabilities. Google can instead take the opportunity to get a head start on fixing a large group of vulnerabilities, and the prize rewards are likely much cheaper than it would be to have an entire team scour the devices and address problems.

Voyage Technology uses a similar method to help your business overcome potential weaknesses in your IT infrastructure. This practice is called penetration testing, which analyzes your current infrastructure for vulnerabilities in your systems and network components. It’s a common preventative measure that’s designed to keep threats out and identify ways to optimize network security.

But we won’t stop there--we’ll continue to keep a close watch on your organization’s infrastructure and warn you of potential vulnerabilities that might come your way. We can remotely patch and monitor your systems so as to prevent unnecessary vulnerabilities from tripping up your organization's operations. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office WiFi App Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Managed Services Voice over Internet Protocol Budget Gmail Apple Networking How To BDR HIPAA Computing Physical Security Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing 2FA Big Data Operating System Router Risk Management Virtual Private Network Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services The Internet of Things Cooperation Free Resource Project Management Windows 7 Excel Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Customer Service Display Printer Paperless Office Infrastructure Monitoring Document Management Managed IT Service Remote Workers Firewall Telephone Scam Data loss Windows 11 Supply Chain Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management YouTube Meetings VPN Employees Integration Cryptocurrency Modem Hacking User Tip Processor Presentation Computer Repair Mobile Security Data Privacy Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Word Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Safety Administration Vulnerabilities Entertainment Best Practice Trends Supply Chain Management Alert Displays Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel Outsourcing Legal Data Analysis Business Growth Gamification Flexibility Notifications Staff Value Application Legislation Workplace Organization Travel Social Networking Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Hiring/Firing Paperless Alt Codes Content Remote Working IBM Wearable Technology Memory Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Co-managed IT Health IT Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Technology Care Business Communications Typing Wasting Time Trend Micro Network Congestion Specifications Security Cameras Scams Google Drive User Error Microchip Internet Exlporer Software as a Service Competition Knowledge Fraud Hybrid Work Human Resources Username Managing Costs Point of Sale eCommerce 5G Black Friday SSID Cables Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Google Apps Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine User Cookies Monitors Cyber Monday Medical IT IT Maintenance Google Wallet Proxy Server Reviews Tactics Development Hotspot Transportation Business Intelligence Shortcuts Windows 8 IP Address Laptop Websites Mirgation Hypervisor Nanotechnology Optimization PowerPoint Ransmoware Drones Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Vendors Navigation Be Proactive Management PCI DSS Halloween Chatbots Recovery Screen Reader Hard Drives Writing Distributed Denial of Service Workforce Lenovo Gig Economy Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Threats Evernote Workplace Strategies Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Refrigeration Fun Meta Superfish Bookmark Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Amazon Financial Data Lithium-ion battery Error History Education Connectivity IT Social Engineering Break Fix Entrepreneur Outsource IT Browsers Smartwatch Media Upload Procurement Remote Computing Azure Environment Multi-Factor Security Tech Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Undo Search Dark Web Small Businesses CES

Blog Archive