(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Rewards Hackers Handsomely for Exposing Flaws

Google Rewards Hackers Handsomely for Exposing Flaws

Google has implemented a project to encourage assistance in collecting potential vulnerabilities for its Nexus line of mobile devices, with some considerable prizes associated with it.

Called the Project Zero Prize contest, contestants must be able to hack into a Nexus 6P and a Nexus 5X with nothing but the phone numbers and associated email addresses. Additionally, any vulnerability found must be capable of executing codes on each device remotely after a message (either email or text) is opened. Simple, right?

Not really, and that’s probably because Google is running more than just your run-of-the-mill bug bounty initiative. Google also wants to collect information on the bugs; how they work, and what methods they can use to improve protections against just these types of exploits.

As for prizes, Google is offering three top prizes awarded on a first-come, first-serve basis. Worth $200,000 for first, $100,000 for second, and “at least” $50,000 for third, the cash prizes come with the opportunity to produce a guest post on their Project Zero Blog.

By holding this competition, Google is taking advantage of the full benefits of crowdsourcing. Rather than waiting to solve a problem after it is discovered and having to pay an entire team to reach a resolution for the single issue, Google can now get in front of a potentially much larger group of vulnerabilities and gain a head start in fixing them, for what is very likely a much cheaper price for them to pay in the long run.

Carceron utilizes a similar strategy to determine security weaknesses for our clients. By utilizing a process known as penetration testing, potential (or current) vulnerabilities in systems and networks are located and identified in order to better protect your systems from malicious intrusions in the future.

In addition to this service, you can be sure that Carceron will continue to keep its eye out for any vulnerabilities that your tech may face for you, protecting your essential data as much as we possibly can. Give Carceron a call at (770) 424-3393 to talk to us about our services today--and, if you are so inclined, read the Project Zero Security Official Contest Rules here to learn the requirements for entry. Who knows? Maybe you’ll be the one to discover the worst vulnerability that the Nexus line has!


No comments yet
Already Registered? Login Here
Thursday, 20 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Internet Tip of the Week Microsoft Business Management Managed Service Provider Software Cloud Workplace Tips Backup Saving Money Hardware Data Small Business Productivity Gadgets Hackers Mobile Office Business Computing Business Email Google Malware Hosted Solutions IT Services Quick Tips Social Media IT Support Virtualization Upgrade Mobile Devices Business Continuity Passwords Users Smartphones Disaster Recovery Microsoft Office Windows Network WiFi Server VoIP Miscellaneous Innovation Computer User Tips Windows 10 Vendor Management Smartphone Efficiency Mobile Computing Communication Mobile Device Management Unified Threat Management Operating System Remote Computing The Internet of Things Marketing BYOD Apps Holiday History Analytics Ransomware Health IT Consultant Android Facebook Going Green Wireless Technology Apple Windows 8 Bring Your Own Device Alert Content Filtering Printer Information Technology Saving Time Tech Support Hard Drives Lithium-ion Battery Big data Outlook Office Network Security Spam Hiring/Firing Data Management Save Money Phishing Firewall Employer-Employee Relationship Gmail Collaboration Remote Monitoring Smart Phones Computer Repair Save Time Bandwidth Maintenance Proactive IT Tutorials Automation Best Practice Computers Search Browser Antivirus Humor Education iPhone Hacker Budget Internet of Things Administration Document Management Black Market Phone System Two-factor Authentication Excel Money Wireless App Running Cable Current Events Fax Server Mobile Device Hacking User PowerPoint Help Desk User Error Managed IT services Sports Avoiding Downtime Virus Intranet Business Intelligence Router Cortana Pain Points SaaS Printer Server Presentation Risk Management IBM Processors Gaming Console communications Telephone Systems Documents Compliance Thin Client Business Growth Retail Statistics Streaming Media Encryption Website Net Neutrality Networking Virtual Desktop Managed IT BDR Network Congestion Experience End of Support Heating/Cooling Artificial Intelligence Customer Relationship Management Twitter Law Enforcement Social Networking Digital Payment Bluetooth Outsourced IT Legal Laptop Computer Accessories Office 365 Data storage Comparison Augmented Reality Safety Company Culture Social Flexibility Cost Management Text Messaging Inbound Marketing VPN Downtime Office Tips Customer Service Government USB Computing Recovery Comanaged IT Programming Cybercrime Password Hosted Solution Chrome Robot Electronic Payment CIO Entrepreneur Archive Teamwork Memory Wi-Fi Music Update organize Upgrades Webinar Best Available Video Surveillance Flash IP Address Online currency Storage Trending Point of Sale Read Human Resources Deep Learning Keyboard LiFi Value Debate Settings Banking Monitors GPS PDF Shortcut Visible Light Communication Adroid Lifestyle Language Leadership Business Metrics Google Wallet Troubleshooting Microserver Displays 3D Advertising Chromebook Domains Drones Business Owner Turn Key File Sharing eWaste YouTube Touchscreen Co-Managed IT Work/Life Balance Specifications Writing Environment Competition Unified Communications Download Harddrive LinkedIn Entertainment Staffing Adminstration Analytic switches Wearable Technology Riske Management Paperless Office Application Permissions Digital Signature Mouse Microchip Google Docs Disaster Operating Systerm Regulations Identity Theft Solid State Drive Hacks DDoS Securty IT consulting Display Ebay Virtual Reality Society Tablet Efeciency Notifications Micrsooft Word Windows XP Content Management Pirating Information IT service Computing Infrastructure Public Speaking External Harddrive HIPAA Recycling Skype

Mobile? Grab this Article!


Recent Comments

No comments yet.

Blog Archive