• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / The results of Mobile Pwn2Own 2014

The results of Mobile Pwn2Own 2014

2014-11-11 by Jason

The third annual Mobile Pwn2Own was held in Tokyo at the PacSec conference. HP with Google Android security team and Blackberry sponsoring are offering cash and prizes totaling over $425,000 to security researchers able to compromise the mobile devices. The payout breakdown provides for different reward levels depending on which vector was used to hack it.

  • Mobile Web Browser ($50,000)
  • Mobile Application/Operating System ($50,000)
    • Reachable by a remote attacker (including through browser)
  • Short Distance ($75,000), either:
    • Bluetooth, or
    • Wi-Fi, or
    • Near Field Communication (NFC)
  • Messaging Services ($100,000), either:
    • Short Message Service (SMS), or
    • Multimedia Messaging Service (MMS), or
    • Commercial Mobile Alert System (CMAS)
  • Baseband ($150,000)
    • Limited to Apple iPhone, Google Nexus, BlackBerry Z30 Only

See Pwn2Own.com for more details of the Mobile Pwn2Own event rules.

Many of the latest and greatest devices are available as targets in the competition including the Amazon Fire Phone, Apple iPhone 5S, Apple iPad Mini with Retina Display, BlackBerry Z30, Google Nexus 5, Google Nexus 7, Nokia Lumia 1520, Samsung Galaxy S5.

The schedule and results are currently:

Pwned : lokihardt@ASRT (South Korea), Apple Phone 5S, targeting web browser (possibly Wi-Fi)

Pwned : Team MBSD (Japan), Android (Samsung Galaxy S5), targeting NFC

Pwned : Jonathan Butler (MWR) (South Africa), Android (Samsung Galaxy S5), targeting Wi-Fi (short distance)

Pwned : Adam Laurie (UK), Android (LG Nexus 5), targeting NFC

Pwned : Kyle Riley, Bernard Wagner, Tyrone Erasmus (MWR) (South Africa), Amazon Fire Phone, targeting mobile OS

Partially pwned: Nico Joly (France), Windows Phone, targeting web browser

Partially pwned: Juri Aedla (Estonia), Android, targeting Wi-Fi (short distance)

(The above will be updated as they proceed through the 2 day event, currently underway.)

Read the day one recap and the day two recap at the HP Security Research blog.

Filed Under: Security and Privacy

Trending

  • Amazon enters the set top race with their Fire TV
    In Hardware, Gadgets, and Products
  • Some Killer Hardware To Teach Users A Lesson
    In Hardware, Gadgets, and Products
  • Building Secure Mobile Apps
    In Infographics

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • Configure Outlook to recurring appointments for the last weekday of the month Configure Outlook to recurring appointments for the last weekday of the month
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • 3d rendering circuit cloud for cloud computing technology Build and Deploy a Modern Web 3.0 Blockchain App in 2022
  • Telecom Application Development: When to Outsource Telecom Application Development: When to Outsource
  • Printer printing document wirelessly from mobile phone or smartphone wifi connection vector flat cartoon illustration, file air print on fax or ink jet via cellphone bluetooth modern design Why Your Business Needs Online Fax Services In 2022
  • 6 Best Ways to Protect Your Business Account 6 Best Ways to Protect Your Business Account
  • How to download videos from Instagram How to download videos from Instagram
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • Build and Deploy a Modern Web 3.0 Blockchain App in 2022
  • Telecom Application Development: When to Outsource
  • Why Your Business Needs Online Fax Services In 2022

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2022 · Magazine Pro Theme on Genesis Framework · WordPress · Log in