Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

This “contest” is called Project Zero, in which users must hack into a Nexus 6P and a Nexus 5X using only the phone numbers and associated email addresses. Additionally, the vulnerabilities discovered need to be capable of executing code on the devices remotely when an email or text message is opened. This is actually much more difficult than it sounds, and Google wants to use this contest to discover vulnerabilities and determine how they work, what their methods are, and how best to protect users from similar exploits.

All in all, it’s an attempt to improve the value and quality of the device, and Google’s trying to get users in on the action.

Google is offering prizes on a first-come, first-serve basis. Here are the prizes in descending order:

  • 1st: $200,000
  • 2nd: $100,000
  • 3rd: “at least” $50,000

Additionally, the cash prizes come with the opportunity to author a guest post on Google’s Project Zero blog.

One of the benefits of crowdsourcing this responsibility to consumers is that Google doesn’t have to pay an entire team to find a resolution or detect vulnerabilities. Google can instead take the opportunity to get a head start on fixing a large group of vulnerabilities, and the prize rewards are likely much cheaper than it would be to have an entire team scour the devices and address problems.

Voyage Technology uses a similar method to help your business overcome potential weaknesses in your IT infrastructure. This practice is called penetration testing, which analyzes your current infrastructure for vulnerabilities in your systems and network components. It’s a common preventative measure that’s designed to keep threats out and identify ways to optimize network security.

But we won’t stop there--we’ll continue to keep a close watch on your organization’s infrastructure and warn you of potential vulnerabilities that might come your way. We can remotely patch and monitor your systems so as to prevent unnecessary vulnerabilities from tripping up your organization's operations. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 09 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Workplace Tips Privacy Google Email Computer Workplace Strategy Hosted Solutions Backup Collaboration Small Business Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Compliance Cloud Computing Training Covid-19 Server Managed Service Provider IT Support Remote Work Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Business Technology Vendor Windows 10 Bandwidth Virtualization Managed Services Data Security Apps Two-factor Authentication Mobile Office App Voice over Internet Protocol Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking How To BDR Conferencing Computing Hacker Physical Security Information Technology Avoiding Downtime Access Control Marketing Office 365 HIPAA Applications Password Managed IT Services Healthcare Operating System Computers Virtual Private Network Risk Management Website Health Router Analytics Office Tips Augmented Reality Retail Storage 2FA Help Desk Bring Your Own Device Big Data Social Remote Workers Managed IT Service Going Green Patch Management Telephone Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Cooperation Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Firewall Document Management Windows 11 The Internet of Things Scam Monitoring Data loss Excel Saving Time Virtual Machines Professional Services Robot Downloads Customer Relationship Management Settings iPhone Printing Wireless Licensing Content Filtering Entertainment Vulnerabilities Hacking IT Management Presentation VPN YouTube Meetings Data Privacy Images 101 Cryptocurrency Wireless Technology Multi-Factor Authentication Mobility Telephone System Computer Repair Cost Management Virtual Desktop Data storage LiFi Word Outlook Employees Machine Learning Integration Money Modem Humor User Tip Processor Mobile Security Holidays Safety Maintenance Antivirus Sports Mouse Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Administration Gig Economy Alert Screen Reader Distributed Denial of Service Workplace Application Best Practice Managed IT Buisness File Sharing Service Level Agreement Internet Service Provider Dark Data Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless IBM Legal IT solutions Regulations Compliance How To Bookmark Notifications Smart Tech Memes Co-managed IT Business Growth Travel Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Techology Google Maps Financial Data Cortana Browsers Smartwatch Connectivity IT Break Fix Scams Alt Codes Competition Downtime Unified Threat Management Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Unified Threat Management Hosted Solution Social Network Telework CES IoT Communitications Dark Web Cables Typing Trends Supply Chain Management Network Congestion Regulations Google Calendar Term Google Apps Google Drive User Error User Customer Resource management FinTech Knowledge Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Point of Sale Gamification Flexibility 5G Staff Value Business Intelligence Social Networking Legislation Shortcuts IP Address Google Docs Unified Communications Organization Experience Fileless Malware Digital Security Cameras Running Cable Tech Support Smart Devices Ransmoware Bitcoin Network Management Google Wallet Content Remote Working Monitors Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Recovery Health IT Directions Videos Laptop Websites Assessment Electronic Health Records Permissions Workforce Hard Drives Windows 8 Domains Drones Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies SharePoint Electronic Medical Records Microchip Halloween Internet Exlporer Software as a Service Fraud Meta Refrigeration Public Speaking Lenovo Username Writing Managing Costs Amazon eCommerce Black Friday SSID Lithium-ion battery Virtual Reality Hacks Server Management Entrepreneur Scary Stories Private Cloud Database Surveillance Virtual Assistant Outsource IT Media Superfish Identity Theft Fun IT Technicians Virtual Machine Environment Twitter Cookies Cyber Monday Medical IT Deep Learning Proxy Server Reviews Undo Error Tactics Development Hotspot Transportation Small Businesses Education Social Engineering Mirgation Hypervisor Displays Shopping Remote Computing Nanotechnology Optimization PowerPoint Mobile Computing Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Tablet Management PCI DSS Search

Blog Archive