• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / The results of Mobile Pwn2Own 2014

The results of Mobile Pwn2Own 2014

2014-11-11 by Jason

The third annual Mobile Pwn2Own was held in Tokyo at the PacSec conference. HP with Google Android security team and Blackberry sponsoring are offering cash and prizes totaling over $425,000 to security researchers able to compromise the mobile devices. The payout breakdown provides for different reward levels depending on which vector was used to hack it.

  • Mobile Web Browser ($50,000)
  • Mobile Application/Operating System ($50,000)
    • Reachable by a remote attacker (including through browser)
  • Short Distance ($75,000), either:
    • Bluetooth, or
    • Wi-Fi, or
    • Near Field Communication (NFC)
  • Messaging Services ($100,000), either:
    • Short Message Service (SMS), or
    • Multimedia Messaging Service (MMS), or
    • Commercial Mobile Alert System (CMAS)
  • Baseband ($150,000)
    • Limited to Apple iPhone, Google Nexus, BlackBerry Z30 Only

See Pwn2Own.com for more details of the Mobile Pwn2Own event rules.

Many of the latest and greatest devices are available as targets in the competition including the Amazon Fire Phone, Apple iPhone 5S, Apple iPad Mini with Retina Display, BlackBerry Z30, Google Nexus 5, Google Nexus 7, Nokia Lumia 1520, Samsung Galaxy S5.

The schedule and results are currently:

Pwned : lokihardt@ASRT (South Korea), Apple Phone 5S, targeting web browser (possibly Wi-Fi)

Pwned : Team MBSD (Japan), Android (Samsung Galaxy S5), targeting NFC

Pwned : Jonathan Butler (MWR) (South Africa), Android (Samsung Galaxy S5), targeting Wi-Fi (short distance)

Pwned : Adam Laurie (UK), Android (LG Nexus 5), targeting NFC

Pwned : Kyle Riley, Bernard Wagner, Tyrone Erasmus (MWR) (South Africa), Amazon Fire Phone, targeting mobile OS

Partially pwned: Nico Joly (France), Windows Phone, targeting web browser

Partially pwned: Juri Aedla (Estonia), Android, targeting Wi-Fi (short distance)

(The above will be updated as they proceed through the 2 day event, currently underway.)

Read the day one recap and the day two recap at the HP Security Research blog.

Filed Under: Security and Privacy

Trending

  • Where to find the results from a scheduled Chkdsk
    In Tech Solutions
  • Kindle E-Readers require update before March 22nd
    In Featured, Hardware, Gadgets, and Products
  • Two computers, One set of speakers
    In Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Setup your DFS namespace with DNS for compatibility in a mixed environment Setup your DFS namespace with DNS for compatibility in a mixed environment
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in