Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

This “contest” is called Project Zero, in which users must hack into a Nexus 6P and a Nexus 5X using only the phone numbers and associated email addresses. Additionally, the vulnerabilities discovered need to be capable of executing code on the devices remotely when an email or text message is opened. This is actually much more difficult than it sounds, and Google wants to use this contest to discover vulnerabilities and determine how they work, what their methods are, and how best to protect users from similar exploits.

All in all, it’s an attempt to improve the value and quality of the device, and Google’s trying to get users in on the action.

Google is offering prizes on a first-come, first-serve basis. Here are the prizes in descending order:

  • 1st: $200,000
  • 2nd: $100,000
  • 3rd: “at least” $50,000

Additionally, the cash prizes come with the opportunity to author a guest post on Google’s Project Zero blog.

One of the benefits of crowdsourcing this responsibility to consumers is that Google doesn’t have to pay an entire team to find a resolution or detect vulnerabilities. Google can instead take the opportunity to get a head start on fixing a large group of vulnerabilities, and the prize rewards are likely much cheaper than it would be to have an entire team scour the devices and address problems.

Voyage Technology uses a similar method to help your business overcome potential weaknesses in your IT infrastructure. This practice is called penetration testing, which analyzes your current infrastructure for vulnerabilities in your systems and network components. It’s a common preventative measure that’s designed to keep threats out and identify ways to optimize network security.

But we won’t stop there--we’ll continue to keep a close watch on your organization’s infrastructure and warn you of potential vulnerabilities that might come your way. We can remotely patch and monitor your systems so as to prevent unnecessary vulnerabilities from tripping up your organization's operations. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone AI Android Upgrade Disaster Recovery Data Recovery Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Managed Services Voice over Internet Protocol Gmail Apple Networking WiFi App Computing HIPAA Information Technology Applications Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To BDR Operating System Router Virtual Private Network Risk Management Computers Health Website Analytics Office Tips Help Desk Augmented Reality 2FA Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Remote Monitoring End of Support Microsoft 365 Vulnerability Vendor Management Cybercrime Solutions Physical Security Customer Service Display Printer Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Firewall Remote Workers Scam Data loss Telephone The Internet of Things Cooperation Free Resource Project Management Social Windows 7 Going Green Patch Management Save Money Telephone System Multi-Factor Authentication Mobility Settings Wireless Cost Management Printing Content Filtering Customer Relationship Management IT Management VPN YouTube Meetings Employees Cryptocurrency Hacking Integration Presentation Computer Repair User Tip Modem Virtual Desktop Processor Mobile Security Data storage Wireless Technology LiFi Holidays Outlook Data Storage Machine Learning Smart Technology Money Video Conferencing Managed Services Provider Humor Word Supply Chain Saving Time Virtual Machines Professional Services Maintenance Sports Managed IT Service Antivirus Mouse Downloads iPhone Safety Administration Licensing Entertainment Vulnerabilities Data Privacy Images 101 Robot Organization Social Networking Legislation IBM Alt Codes IT Maintenance Downtime Unified Threat Management Business Intelligence Fileless Malware Digital Security Cameras Smart Devices Wearable Technology Memory Unified Threat Management Hosted Solution Shortcuts Content Remote Working Ransmoware Health IT Motherboard Data Breach Comparison Google Play Typing Vendors Directions Videos Network Congestion Assessment Electronic Health Records Permissions Wasting Time Google Drive User Error Competition Knowledge Be Proactive Workforce Trend Micro Specifications Security Cameras Point of Sale Threats Microchip 5G Internet Exlporer Software as a Service Fraud Managing Costs Google Docs Unified Communications Experience Workplace Strategies Username User Running Cable Tech Support Meta eCommerce Black Friday SSID Bitcoin Network Management Google Wallet Amazon Monitors Database Surveillance Virtual Assistant IT Technicians Virtual Machine Laptop Websites Outsource IT Proxy Server Reviews Cookies Cyber Monday Medical IT IP Address Windows 8 Drones Environment Media Tactics Development Hotspot Transportation Mirgation Hypervisor SharePoint Electronic Medical Records Recovery Halloween Small Businesses Shopping Nanotechnology Optimization PowerPoint Lenovo Hard Drives Displays Writing Addiction Language Employer/Employee Relationships Chatbots Navigation Domains Virtual Reality Management PCI DSS Scary Stories Private Cloud Outsourcing Gig Economy Screen Reader Distributed Denial of Service Hacks Server Management Superfish Refrigeration Identity Theft Fun Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Identity Evernote Public Speaking Deep Learning Twitter Workplace Regulations Compliance Error Hiring/Firing Bookmark Smart Tech Memes Lithium-ion battery Education Entrepreneur Social Engineering Paperless Download Net Neutrality Alerts SQL Server History Remote Computing Co-managed IT Financial Data Technology Care Browsers Smartwatch Connectivity IT Break Fix Mobile Computing Undo Tablet Search Business Communications Upload Procurement Azure Social Network Telework Cyber security Multi-Factor Security Tech Best Practice Alert Scams Buisness File Sharing Hybrid Work CES Dark Data IoT Communitications Dark Web Managed IT Legal IT solutions How To Human Resources Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Business Growth Notifications Cables Application Travel Data Analysis Star Wars IT Assessment Microsoft Excel Staff Value Techology Google Maps Cortana Google Apps Gamification Flexibility

Blog Archive