Google’s new authentication option: a tap on the screen
Google knowns that usability is a pre-requisite for security, so they’ve come up (yet again) with a new option within the 2-step verification feature for Google …
Malware devs scour GitHub for new ideas for bypassing Android security
Android malware developers are misusing techniques unearthed in GitHub projects to bypass security measures introduced in the latest versions of the mobile OS. GitHub, the …
Google Chrome update includes 15 security fixes
Google has released Chrome 51.0.2704.79 to address multiple vulnerabilities for Windows, Linux, and OS X. Exploitation of some of these vulnerabilities may allow a remote …
Improving software security through a data-driven security model
The current software security models, policies, mechanisms, and means of assurance are a relic of the times when software began being developed, and have not evolved along …
Google Allo messaging app offers end-to-end crypto, but not as default
On Wednesday, at its annual developer-focused conference, Google introduced two new cross-platform apps: Allo and Duo. Google Allo is a messaging app, and Duo is a video …
Google drops support for old crypto on Gmail, SMTP servers
In less than a month, Google will stop supporting SSLv3 and RC4 on its SMTP and Gmail’s web servers. The end of support is not unexpected, as the Internet giant announced the …
Gboard enhances your keyboard, but what about your privacy?
Gboard is a Google app for your iPhone that lets you search and send information, GIFs, emojis and more, right from your keyboard. You can search and send anything from …
The fragile security of the mobile ecosystem
Mobile devices such as smartphones and tablets have become indispensable in our daily lives. In fact, in Q4 2015, smartphones accounted for around 75 percent of all mobile …
Solutions for the hijacked websites problem
According to a group of researchers from Google and University of California Berkeley, roughly 16,500 new sites get hijacked each week and start serving drive-by-malware or …
Chrome Web Store developers have to improve user data transparency
Google has announced that it’s modifying the User Data Policy for the Chrome Web Store, and developers have three months to make the needed changes if they don’t …
Google’s poor design decision undermines 2FA protection
A design decision by Google can be exploited by attackers to gain control of both devices needed to access users’ accounts protected via SMS-based 2-factor …
New alerts for Gmail users targeted by state-sponsored attackers
Since 2012, Google has been warning Gmail users when they have been targeted by state-sponsored attackers, but now the alert will be even more visible (and therefore less …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd