Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Customer Service Server Wearable Technology End of Support Fraud Malware Google Drive Sports Mouse Help Desk Time Management Save Time Business Owner IT Support Cookies Professional Services Analyitcs Computer Care Employee-Employer Relationship Productivity Data storage Electronic Health Records Development Printer Antivirus Authentication Hosted Solution Security Information Technology Management Microsoft Wireless Politics VPN Unified Communications Backups Travel Managed Services Provider Shortcut Managed Service Provider Unified Threat Management Technology Tips Windows 8 Workplace Tips Webcam Legal Office Tips Gadgets Employees Regulations Entrepreneur Migration Virtual Reality Office Augmented Reality Patch Management User Tips Application Database Big Data Authorization Mobile Device Managment Managed IT Passwords Business Technology Mirgation Software as a Service Windows 7 MSP Experience Project Management Managing Stress Spyware Telephone Systems Flexibility Small Business IT service Tech Terms Halloween Social Media Gadget Bluetooth Virtual Desktop Microsoft Excel Tech Support PowerPoint Wireless Technology Remote Workers Network Security Notifications Lenovo Physical Security Telephony CCTV Monitoring Motion Sickness eWaste Asset Tracking Typing Troubleshooting Favorites Search Upgrades Operating System Word Mobile Security Social Networking Infrastructure Monitors IT Consultant Education Marketing Cloud Knowledge Business Growth Human Error Public Cloud Disaster Data Smart Tech communications Customer Relationship Management ROI Cloud Computing Alert Avoiding Downtime Content Filtering Dark Data Intranet Superfish Privacy VoIP Voice over Internet Protocol Computer Cortana Miscellaneous Taxes Break Fix Remote Computing Fun Downtime Data Management Tablet Cache Computing HIPAA Encryption Black Market Remote Worker Browser Data loss BYOD PDF IT Consulting WiFi Google Docs Network Management Two-factor Authentication Efficiency Tech Term Refrigeration Budget User LiFi Automation Cables Administration Heating/Cooling Money Hacks Vulnerabilities Vendor Management Zero-Day Threat Assessment Licensing Screen Reader High-Speed Internet Google Maps Touchscreen Compliance Office 365 Social Google Calendar G Suite Business Computing Network Congestion RMM Chromebook Wi-Fi Relocation Paperless Office Cybercrime Undo Windows 10 Utility Computing Wasting Time Data Security Nanotechnology Going Green OneNote Solid State Drive Settings Writing Multi-Factor Security Statistics Presentation Black Friday Virtual Assistant How To IT Support Blockchain Internet Piracy Google Wallet Bookmarks Electronic Medical Records Virtualization Business Continuity Microsoft Office Scary Stories Finance Public Speaking Crowdsourcing CIO Cost Management Programming Techology Server Management Administrator Instant Messaging Productivity Mobile Device IT solutions Outlook Notes Best Practice How To Social Engineering Trending File Sharing Training Lithium-ion Battery Data Recovery Alerts Wires Buisness Smartphone Bitcoin Connectivity Innovation Save Money Risk Management Access Control Hacking Mail Merge Mobile Data Mobile Computing Dark Web Modem Star Wars Emoji Unsupported Software Technology Laws Permission Cybersecurity Supercomputer Servers Maintenance Sync Tip of the Week Saving Time Gmail E-Commerce Bandwidth Mobile Devices Uninterrupted Power Supply Read Only Software IT Management Tracking GPS Users Hard Drive Address Mobile Device Management Computing Infrastructure Mobile Office Features Test Security Cameras Mobility Document Management Windows Drones Best Practices Laptop Facebook Safety Internet of Things Cryptocurrency Deep Learning Technology Managed IT Services Phishing History Hosted Solutions Vulnerability Legislation Hard Disk Drive Meetings Disaster Recovery Apps Storage Robot Computers Environment Retail YouTube Business Intelligence Net Neutrality Internet Exlporer Tip of the week Government Information VoIP Google Recycling Distributed Denial of Service Hackers Collaboration Managed IT services Specifications Identity Chatbots Mobile Smartphones Windows 10 Websites Managed IT Service Printing Remote Monitoring Computer Repair Hotspot Files Update IT Technicians Downloads Software Tips Personal Information Consultation Spam Data Warehousing The Internet of Things Saving Money Cyber Monday Firewall Communication Applications Law Enforcement Scam Email Procurement WPA3 SharePoint Identities Cameras Virus Consulting Competition Domains Hiring/Firing Virtual Private Network Comparison Display Digital Signature Data Backup Language Data Breach Smart Technology Staff Company Culture IT Services Password Web Server Business Management Identity Theft SaaS Motherboard IT Budget Geography Work/Life Balance Outsourced IT 3D Printing Fleet Tracking Hacker Artificial Intelligence Hard Drives Permissions Hardware Alt Codes Business Proactive Error Cleaning Ransomware Processors USB Conferencing Machine Learning Automobile Digital Payment Cooperation Backup and Disaster Recovery Botnet Theft Private Cloud Quick Tips Co-managed IT BDR Analytics Digital Redundancy Enterprise Resource Planning Staffing Health User Error Upgrade Phone System 5G Managed Service Holiday Healthcare Consumers Documents Website Disaster Resistance Twitter Firefox iPhone IP Address Operations Cyberattacks Corporate Profile IBM Apple Unified Threat Management App Network Point of Sale Current Events Samsung Employer-Employee Relationship Recovery Android Financial Proactive IT Cabling Networking Running Cable Remote Monitoring and Management WannaCry Bring Your Own Device Backup Enterprise Content Management Humor Router Chrome IoT

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...