Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Lenovo Alert Chatbots Law Enforcement Application Downtime Tech Terms History Safety Collaboration Big Data Identity Budget G Suite Firefox Bitcoin Documents Deep Learning Malware Cybercrime Tip of the week Hard Disk Drive Servers Social Networking Artificial Intelligence Competition Time Management Microsoft Office Remote Monitoring and Management Business Owner Software Tips Access Control Office 365 Going Green Workplace Tips Quick Tips Managed IT Services Electronic Health Records Windows 10 Cleaning Shortcut Identity Theft Encryption IT solutions Administrator IT Management Mobile Device Wi-Fi Assessment Corporate Profile IT service Smart Tech Troubleshooting Specifications Innovation Permission Digital Signature Superfish Refrigeration Virtualization Vulnerabilities Saving Time Uninterrupted Power Supply Mouse Proactive IT Data loss Environment Scary Stories Hosted Solution Chrome Spyware Gadget Passwords Cost Management Alerts Heating/Cooling Consulting Firewall Outlook Phone System LiFi Hackers Buisness Supercomputer Test Business Technology Word Miscellaneous IP Address Privacy Money Software Mobile Data Net Neutrality Google Cortana YouTube SharePoint Two-factor Authentication Personal Information Statistics Point of Sale Permissions Google Wallet Windows VoIP Programming Antivirus Sports Crowdsourcing IT Support Features Managed Services Provider Content Filtering VPN Knowledge Email Data Recovery Vendor Management Microsoft Save Money Humor Search Marketing IT Consulting Wearable Technology Employer-Employee Relationship Storage Printer Zero-Day Threat Dark Data Microsoft Excel Health Meetings Electronic Medical Records Networking Geography Lithium-ion Battery Co-managed IT Migration Technology Tips VoIP Break Fix Hard Drive Files Undo Staff Finance Scam Procurement Data Management Data storage Internet of Things Social Engineering Mobility Asset Tracking WPA3 Cameras Saving Money Halloween 5G Blockchain Apple Productivity Update Conferencing IT Budget Cyberattacks Licensing IBM Managed IT Service Managing Stress Screen Reader Business Growth Remote Computing Server Management Techology Computing E-Commerce Enterprise Content Management Digital User Wires Mobile Devices IT Support Network Compliance Backup and Disaster Recovery Private Cloud Apps Domains Vulnerability Education Google Calendar Work/Life Balance Smartphone Unified Communications Cabling File Sharing Managed IT Computing Infrastructure Government Relocation Hard Drives Document Management Healthcare Nanotechnology Efficiency Public Speaking Analyitcs Human Error Running Cable Disaster Resistance Save Time Automobile Printing Entrepreneur 3D Printing Telephone Systems Windows 10 Regulations Politics Data Security Black Friday Unified Threat Management Technology Laws Bandwidth Mobile Security Cameras Android PDF Instant Messaging Google Docs Virtual Private Network IoT Customer Service Hacking Read Only Star Wars Redundancy Help Desk Hacks Backups Website Theft Touchscreen Bookmarks Cyber Monday Applications Distributed Denial of Service Risk Management Data Warehousing Customer Relationship Management Emoji Hosted Solutions Disaster Infrastructure Software as a Service Websites Training Windows 8 Writing Small Business Best Practice Twitter Project Management Piracy Smartphones communications Digital Payment Consumers Recovery Network Congestion Outsourced IT The Internet of Things Cloud Computing Network Management Social Media Internet Exlporer Remote Monitoring Comparison Hacker Drones Analytics Black Market Address Bluetooth Business Communication Data Breach Wireless Managed Service Upgrade Physical Security WiFi Monitors Cloud Dark Web App Cookies Public Cloud Authentication Management Fun Connectivity Unified Threat Management Tech Support Legal CIO CCTV Technology BYOD Office Computers Robot Gmail Identities IT Services Google Drive Settings Legislation Chromebook Proactive Virtual Reality Display Upgrades How To Telephony Typing Cybersecurity Phishing Security Tracking Downloads Retail Fraud PowerPoint Cables Language Hotspot Ransomware User Error Authorization Google Maps iPhone Cryptocurrency Employees Computer Repair Operating System Business Computing Paperless Office Mirgation Modem Mobile Office Holiday Motherboard Cache Server Patch Management Financial Smart Technology Webcam Augmented Reality Backup Managed Service Provider BDR GPS Office Tips Development Business Continuity Laptop Browser End of Support Flexibility Information Technology Utility Computing Data Gadgets Error Business Intelligence Computer Solid State Drive Alt Codes User Tips Hiring/Firing Multi-Factor Security Spam Facebook Botnet Tech Term Business Management Mobile Security Taxes Avoiding Downtime Managed IT services Notifications Mail Merge OneNote Intranet Staffing Maintenance Tip of the Week Current Events Processors IT Consultant Fleet Tracking ROI Web Server Computer Care SaaS MSP Favorites Sync Data Backup IT Technicians Presentation Users Mobile Device Management Internet Employee-Employer Relationship Company Culture High-Speed Internet HIPAA Consultation Productivity Mobile Computing Monitoring Virtual Desktop Travel Remote Worker Disaster Recovery Tablet Remote Workers Unsupported Software Hardware Virus Automation Administration Mobile Device Managment Trending Social Enterprise Resource Planning Network Security USB Samsung WannaCry Experience Cooperation eWaste Bring Your Own Device Router RMM Recycling Machine Learning Motion Sickness How To Operations Password Information Best Practices Wireless Technology

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...