Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Rewards Hackers Handsomely for Exposing Flaws

Google Rewards Hackers Handsomely for Exposing Flaws

Google has implemented a project to encourage assistance in collecting potential vulnerabilities for its Nexus line of mobile devices, with some considerable prizes associated with it.

Called the Project Zero Prize contest, contestants must be able to hack into a Nexus 6P and a Nexus 5X with nothing but the phone numbers and associated email addresses. Additionally, any vulnerability found must be capable of executing codes on each device remotely after a message (either email or text) is opened. Simple, right?

Not really, and that’s probably because Google is running more than just your run-of-the-mill bug bounty initiative. Google also wants to collect information on the bugs; how they work, and what methods they can use to improve protections against just these types of exploits.

As for prizes, Google is offering three top prizes awarded on a first-come, first-serve basis. Worth $200,000 for first, $100,000 for second, and “at least” $50,000 for third, the cash prizes come with the opportunity to produce a guest post on their Project Zero Blog.

By holding this competition, Google is taking advantage of the full benefits of crowdsourcing. Rather than waiting to solve a problem after it is discovered and having to pay an entire team to reach a resolution for the single issue, Google can now get in front of a potentially much larger group of vulnerabilities and gain a head start in fixing them, for what is very likely a much cheaper price for them to pay in the long run.

Evolve IT utilizes a similar strategy to determine security weaknesses for our clients. By utilizing a process known as penetration testing, potential (or current) vulnerabilities in systems and networks are located and identified in order to better protect your systems from malicious intrusions in the future.

In addition to this service, you can be sure that Evolve IT will continue to keep its eye out for any vulnerabilities that your tech may face for you, protecting your essential data as much as we possibly can. Give Evolve IT a call at (518) 203-2110 to talk to us about our services today--and, if you are so inclined, read the Project Zero Security Official Contest Rules here to learn the requirements for entry. Who knows? Maybe you’ll be the one to discover the worst vulnerability that the Nexus line has!

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 11 May 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Efficiency Workplace Tips Computer Google Hosted Solutions Microsoft Upgrade IT Support Mobile Devices Innovation Smartphone Windows 10 Hardware Network Security Ransomware Gmail Operating System Microsoft Office Office Backup The Internet of Things Apps Social Media Business Continuity Disaster Recovery Bandwidth Communication Hacking WiFi Facebook Wireless Technology Android Apple Firewall Smartphones Content Filtering Cybercrime Best Practice Alert Website Networking Data storage Data Windows Experience Employer-Employee Relationship History Two-factor Authentication Small Business Phishing Mobile Device Management Money App Network Mobile Computing Big Data Managed Service Provider communications Outlook Safety Unified Threat Management Quick Tips Tech Support End of Support Compliance Government Drones Augmented Reality Keyboard User Social Search Printer Writing Browser Hard Drives Virtual Desktop Remote Computing Wireless Shortcut DDoS Securty Unified Communications Document Management Encryption Heating/Cooling Word Law Enforcement SaaS VoIP Proactive IT Retail Cortana Business Management Network Congestion Competition Save Money Music Managed IT services Presentation Entrepreneur Domains Cryptocurrency Laptop Bluetooth Hacker IBM Google Docs Education Cleaning Automation Holiday Application Black Market Memory YouTube Customer Service Processors Staffing Office Tips LiFi BYOD Deep Learning Downtime Passwords BDR Streaming Media Help Desk Router Disaster Micrsooft Visible Light Communication Office 365 Vendor Management Saving Money Business Growth Data Management Analytics Recovery intranet Robot Advertising Lithium-ion battery Society Monitors Sports Google Wallet Spam Running Cable Social Networking Information Technology Windows 8 Displays Internet of Things Public Speaking Hosted Solution Windows XP IP Address IT Services Virtualization Documents Artificial Intelligence
QR-Code