Pwn2Own contest start Samsung Apple Mobile Huawei hones Hacked reward

Some award equipment to this competition designed by Trend Micro’s Zero Day Initiative (ZDI) beats $500,000 and members should then made a vital part on the first day.
This day began with an effort from Tencent Keen Security Lab to show an exploit next the Internet Browser on a Samsung Galaxy S8. The trial could become made them $70,000, but it failed.

Still, a researcher of that Chinese defense firm Qihoo360 produced a guide to hack the Internet Browser on the Galaxy S8 (with persistence) also take back some $70,000.This authority obtained system execution in this browser also employed a right growth in a strange Samsung app for resolution later a reboot.

While to actions targeting Apple’s iPhone 7 by iOS 11.1, some Tencent Keen Security Lab hands made $110,000 for a sum of four vulnerabilities providing system performance by Wi-Fi also privilege increase for resolution for a reboot. This very organization received an additional $45,000 for hacking Safari on the iPhone 7.
Richard Zhu, aka fluorescence, earned $20,000 for a Safari exploit on an iPhone 7 and a sandbox escape.

The Tencent Keen Security Lab organization also took a crack at the Huawei Mate 9 Pro. Researchers failed to hack the device’s NFC system, but they did manage to develop an exploit targeting the Android phone’s baseband, which earned them $100,000.
This brings the total earned by participants on the first day of Mobile Pwn2Own 2017 to $345,000.

No one has attempted to hack Google’s Pixel telephone or the company’s Chrome browser on that first day, though there are six further hacking attempts efforts for the next day of the event.

The vulnerabilities employed at the competition will be disclosed to Apple, Google, Samsung, and Huawei, and they will be given 90 days to release a fix before limited details about the flaws are made public by ZDI.

One thought on “Pwn2Own contest start Samsung Apple Mobile Huawei hones Hacked reward”

Leave a Reply

Your email address will not be published. Required fields are marked *