Google is actively promoting computers running Chrome OS
The world's number one search engine is scheduled to host a contest called ' Pwnium ' in March, when hackers will have the opportunity to test their skills by invading HP Chromebook 11 or Acer C720 machines. Chromebook , according to The Los Angeles Times .
Google said it would award a special prize worth $ 110,000 and $ 150,000 for successful attacks, with a total of nearly $ 3 million in prizes.
Any hackers who disable Chrome OS can receive a bonus of $ 110,000, while $ 150,000 is for attacks that take control of the computer even when the device is restarted.
" Pwnium " will take place during the CanSecWest security conference in Vancouver, Canada .
RELATED POSTS extensions on google chrome are under attack and a bunch of developers have hacked accounts within the past month.
the new version of google chrome 63 contains a new security feature that will detect third-party software that performs mitm (man-in-the-middle) attacks - one of the network attack techniques that allows hackers to connect to the internet by user and collect personal information.
the 51% attack refers to a potential attack on the integrity of the blockchain system, in which a single malicious actor or organization tries to control more than half of the network's total hash power, .
scammers recently hacked an extension on google chrome after capturing a chrome web store account of a group of german developers a9t9 and using it to send spam messages to users.
a replay attack occurs when a cybercriminal eavesdroves a communication over a secure network, intercepts it, then delays or resends the content, to get the recipient to do what the hacker wants.
volumetric ddos attack is designed to overwhelm internal network capacity with large volumes of malicious traffic. volumetric ddos attack is usually performed against a specific target
an ss7 attack is a very dangerous attack method. an ss7 attack can be used to bypass two-factor authentication. so what specifically is the ss7 attack? what can a hacker do with an ss7 attack?
in part 2 of this series, we have left all the necessary information required for an attack on the victim network. with that note, let's continue with a real attack. this attack follows the transmission of ecommerce
as people become increasingly connected through technology, the vulnerability of devices to cyberattacks continues to increase. one such threat is the bluesmack attack targeting bluetooth-enabled devices.
although it is not a new form of attack, ddos has always been considered as the leading threat to organizations and businesses globally.
in a teardrop denial of service (dos) attack, a client sends an incorrect packet of information to a machine and exploits an error that occurs when the packet is reassembled, resulting in a drop in server performance.
site isolation is a security feature that separates the layout of individual web pages in order to limit this web attack to the other web. this feature will be turned on by default for most chrome users on win, mac, linux and chrome os to protect computers from attacks through the specter vulnerability.