HACKING MADE EASY

LEARN ETHICAL HACKING TO PREVENT BEING HACKED

 

  HOME                                                            WELCOME TO YOU                                          YOUR COMMENTS        CONTACT US

                  FOR MORE INFO CONTACT at   info@hackingmadeeasy.com or call at +91-8800646642                                  

ABOUT US           OUR BOOKS           HOW TO ORDER            SERVICES           HACKING OVERVIEW        HACKING TRICKS

 

 

 

   

Google's Pixel Phone Hacked In Under A Minute

Usually when you spot an article that involves China, an American company, and hacking, it’s bad news. That’s not the case this time. Google actually welcomes this kind of hacking. In fact, they offer big cash rewards to the men and women who do it.

pixel-phone

 

At a security conference in Seoul yesterday, a team from China’s Qihoo 360 managed to hack Google’s brand-new Pixel phone in less than a minute. Their attack left the Pixel vulnerable to remote code execution. Vulnerabilities like this give cybercriminals carte blanche to eavesdrop on victims, digitally pick their pockets, and utilize their devices in botnet attacks.

Fortunately, the Qihoo team was only interested in showing off their skills and pocketing the $120,000 bounty offered by Google. They’re white hat hackers, which makes sense when you know that their employer is one of the largest security software companies in China.

 
 

Now that their exploit is in Google’s hands, Pixel owners can breathe a sigh of relief. A patch should be released soon and their phones will no longer be vulnerable to this particular attack.

Qihoo 360′s security team has been in the spotlight before. Two years ago they pulled off a similar attack on a Tesla Model S. They were able to control its locks, sound the horn, and even open the sunroof while the car was being driven. More worryingly, they shut down the car’s stability and traction controls and interfere with its onboard charging system.

But just like they did with the Pixel phone, they provided the details of their exploit to Tesla and offered to help them fix it.

 

 -----------------------------------------------------------------------------------------------------------------------------------------------------------   

Disclaimer : The information provided on this web pages are for educational purposes only. The author of this book or the CEO of this website is in no way responsible for any kind of damage resulted by the information given on this site or book. This does not have any hacking or cracking software on it. The soul purpose of this site and book is to make impart knowledge and make people aware of the security concern and make themselves ready towards safe computing.

 -----------------------------------------------------------------------------------------------------------------------------------------------------------   

HOME  |  ABOUT US   |  OUR BOOKS  | HOW TO ORDER | SERVICES | HACKING OVERVIEW | HACKING TRICKS | CONTACT US

Copyright © 2014-2015. www.hackingmadeeasy.com  Reproduction Strictly Prohibited. All Rights Reserved 

 

Clicky