TURN THE TIDE ON CLIMATE CRISIS : 1 SIGN PETITIONS, 2 REDUCE 3. INVEST
After finding a number of flaws in software used by many end-users while researching other problems, such as the critical "Heartbleed" vulnerability, Google decided to form a full-time team dedicated to finding such vulnerabilities, not only in Google software but any software used by its users.
Greenberg, Andy (15 July 2014). "Meet 'Project Zero,'
Google's Secret Team of Bug-Hunting Hackers". Wired. ISSN 1059-1028. Retrieved 6 March 2019.
a b c Evans, Chris (15 July 2014). "Announcing Project Zero".
Google Online Security Blog. Retrieved 4 January 2015.
^ "Project Zero Bug Tracker". Retrieved 11 April 2019.
^ "Chris Evans on Twitter". Retrieved 22 September 2015.
a b c d e f Greenberg, Andy (15 July 2014). "Meet 'Project Zero,'
Google's Secret Team of Bug-Hunting Hackers". Wired.com. Retrieved 4 January 2015.
^ "Project Zero Research Blog". Retrieved 11 April 2019.
"Google posts Windows 8.1 vulnerability before Microsoft can patch it". Engadget. Retrieved 4 January 2015.
^ Fingas, John (4 March 2019).
"Google discloses 'high severity' Mac security flaw ahead of patch". Engadget. Retrieved 6 March 2019.
"Google reveals CPU security flaw Meltdown and Spectre details". SlashGear. Retrieved 4 January 2018.
^ "Project Zero Blog: Adventures in Videoconferencing". Retrieved 11 April 2019.
^ "Over The Air: Exploiting Broadcom's Wi-Fi Stack (Part 1)". Retrieved 12 April 2019.
^ "Searching statically-linked vulnerable library functions in executable code". Retrieved 12 April 2019.
^ "Lawfareblog Hard National Security Choices Matt Tait". Retrieved 9 March 2017.
^ "aPAColypse now: Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript". Retrieved 18 December 2017.
^ TIME, The Editors of (19 January 2018). TIME Cybersecurity: Hacking, the Dark Web and You. Time Inc. Books. ISBN 9781547842414.
^ "Issue 118: Windows: Elevation of Privilege in ahcache.sys/NtApphelpCacheControl". 30 September 2014. Retrieved 4 January 2015.
^ "Exploiting the DRAM rowhammer bug to gain kernel privileges". Retrieved 11 April 2019.
Cloudflare Reverse Proxies are Dumping Uninitialized Memory". 19 February 2017. Retrieved 24 February 2017.
^ "Incident report on memory leak caused by Cloudflare parser bug".
Cloudflare. 23 February 2017. Retrieved 24 February2017.
^ "Another hole opens up in LastPass that could take weeks to fix".
Naked Security. 29 March 2017. Retrieved 29 March2017.
^ Siegrist, Joe (31 March 2017).
"Security Update for the LastPass Extension". LastPass Blog. Retrieved 2 May 2017.
^ Greenberg, Andy (3 January 2018).
"A Critical Intel Flaw Breaks Basic Security for Most Computers". WIRED. Retrieved 4 January 2018.
malformed message bricks iPhone". bugs.chromium.org. 18 April 2019. Retrieved 9 September2019.
^ Tim (29 August 2019).
"Project Zero: A very deep dive into iOS Exploit chains found in the wild". Project Zero. Retrieved 30 August 2019.
^ Cox, Joseph (30 August 2019).
"Google Says Malicious Websites Have Been Quietly Hacking iPhones for Years". Vice. Retrieved 30 August 2019.
^ Goodin, Dan (7 September 2019).
"Apple takes flak for disputing iOS security bombshell dropped by Google". Ars Technica.
A description of the images you are showcasing for your project, your process and the artefacts you created along the way
Describe what role you played on your team. Who did you have to work with to achieve your goal? What was the outcome of the project?