Google Asks Hackers to Breach Their New Phone

by | Oct 11, 2016

google_nexus_hacking_400There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

This “contest” is called Project Zero, in which users must hack into a Nexus 6P and a Nexus 5X using only the phone numbers and associated email addresses. Additionally, the vulnerabilities discovered need to be capable of executing code on the devices remotely when an email or text message is opened. This is actually much more difficult than it sounds, and Google wants to use this contest to discover vulnerabilities and determine how they work, what their methods are, and how best to protect users from similar exploits.

All in all, it’s an attempt to improve the value and quality of the device, and Google’s trying to get users in on the action.

Google is offering prizes on a first-come, first-serve basis. Here are the prizes in descending order:

  • 1st: $200,000
  • 2nd: $100,000
  • 3rd: “at least” $50,000

Additionally, the cash prizes come with the opportunity to author a guest post on Google’s Project Zero blog.

One of the benefits of crowdsourcing this responsibility to consumers is that Google doesn’t have to pay an entire team to find a resolution or detect vulnerabilities. Google can instead take the opportunity to get a head start on fixing a large group of vulnerabilities, and the prize rewards are likely much cheaper than it would be to have an entire team scour the devices and address problems.

COMPANYNAME uses a similar method to help your business overcome potential weaknesses in your IT infrastructure. This practice is called penetration testing, which analyzes your current infrastructure for vulnerabilities in your systems and network components. It’s a common preventative measure that’s designed to keep threats out and identify ways to optimize network security.

But we won’t stop there–we’ll continue to keep a close watch on your organization’s infrastructure and warn you of potential vulnerabilities that might come your way. We can remotely patch and monitor your systems so as to prevent unnecessary vulnerabilities from tripping up your organization’s operations. To learn more, reach out to us at PHONENUMBER.

About the Author

Mina Moghadas

Learn more on this topic

Related Blog Posts

Keep Your Technology Up to Date to Retain Employees

Keep Your Technology Up to Date to Retain Employees

Whether you like it or not, millennials (those reaching young adulthood around the year 2000) make up a significant portion of the workforce and will continue to penetrate your industry as more and more staff "age out" of their current roles. Appropriately leveraging...

3 Strong Incentives to Get Your Hardware Organized

Your business relies heavily on hardware; workstations, servers, mobile devices, and more, to keep operations moving forward. However, managing these knowledge-intensive machines can demand your time and resources and often falls in the lap of the business owner. If...

Sextortion 2.0 is the Same Empty Threat with a Twist

Sextortion 2.0 is the Same Empty Threat with a Twist

Sextortion is a form of blackmail where the extortionist claims to have photos or video of the victim watching adult entertainment on their computer. The criminal threatens to send the compromising images out to the victim's email address book. We've described this...