Blog

Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

b2ap3_thumbnail_google_nexus_hacking_400.jpgThere are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

This “contest” is called Project Zero, in which users must hack into a Nexus 6P and a Nexus 5X using only the phone numbers and associated email addresses. Additionally, the vulnerabilities discovered need to be capable of executing code on the devices remotely when an email or text message is opened. This is actually much more difficult than it sounds, and Google wants to use this contest to discover vulnerabilities and determine how they work, what their methods are, and how best to protect users from similar exploits.

All in all, it’s an attempt to improve the value and quality of the device, and Google’s trying to get users in on the action.

Google is offering prizes on a first-come, first-serve basis. Here are the prizes in descending order:

  • 1st: $200,000
  • 2nd: $100,000
  • 3rd: “at least” $50,000

Additionally, the cash prizes come with the opportunity to author a guest post on Google’s Project Zero blog.

One of the benefits of crowdsourcing this responsibility to consumers is that Google doesn’t have to pay an entire team to find a resolution or detect vulnerabilities. Google can instead take the opportunity to get a head start on fixing a large group of vulnerabilities, and the prize rewards are likely much cheaper than it would be to have an entire team scour the devices and address problems.

Network Synergy uses a similar method to help your business overcome potential weaknesses in your IT infrastructure. This practice is called penetration testing, which analyzes your current infrastructure for vulnerabilities in your systems and network components. It’s a common preventative measure that’s designed to keep threats out and identify ways to optimize network security.

But we won’t stop there--we’ll continue to keep a close watch on your organization’s infrastructure and warn you of potential vulnerabilities that might come your way. We can remotely patch and monitor your systems so as to prevent unnecessary vulnerabilities from tripping up your organization's operations. To learn more, reach out to us at (203) 261-2201.

Tip of the Week: 4 Odd Productivity Tips From Succ...
Just Because You Backup Your Data, Doesn’t Mean it...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, 26 December 2024

Captcha Image

Contact us

Learn more about what Network Synergy can do for your business.

Network Synergy
126 Monroe Turnpike
Trumbull, Connecticut 06611

Network Synergy Corporation BBB Business Review

Best IT Managed Service Providers in Bridgeport aicpa logo net syn

News & Updates

Network Synergy is proud to announce the launch of our new website at www.netsynergy.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Copyright Network Synergy. All Rights Reserved.