Poorly redacted court filing reveals Google contested NSL gag order
A court filing that has been improperly redacted and has recently been made public by the US Department of Justice shows that Google asked a US court to remove the gag order …
Social networks: Can robots violate user privacy?
High-Tech Bridge decided to conduct a simple technical experiment to verify how the 50 largest social networks, web services and free emails systems respect – or indeed …
The erosion of privacy in the digital world
Yves Le Roux is the Technology Strategist at CA Technologies and Chair of ISACA’s Data Privacy Task Force. In this interview he discusses the evolution of the digital …
Chrome plugin aims to thwart user profiling efforts
Inspired by a piece of fictional software described in Cory Doctorow’s book Little Brother, developer Ben West created a browser plugin that should, in theory, make it …
Cyber crooks misuse Google service to control Android Trojans
Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …
Google increases rewards for Chromium bug reports
It has recently been proved that setting up bug bounties is a cheaper option than hiring full-time bug hunters, and Google’s two bug bounty programs – Google Web …
Free tool for auditing Google Apps
BeyondTrust released PowerBroker Auditor for Google Apps, available for free, to the BeyondTrust user community. The tool was developed to ease the burdens associated with …
Compromising Google Accounts and enterprises via flaw in Android SSO
When it comes to Android, Google has traded security for convenience, says Tripwire security researcher Craig Young. During his recent presentation at Def Con in Las Vegas, he …
ESET Mobile Security for Android gets an update
ESET rebuilt and redesigned ESET Mobile Security for Android. The next generation mobile product offers improved scanning, Anti-Phishing module and a completely redesigned …
The scary implications of Google Glass
Google Glass, for all its promise, has some scary implications. Here is my list of potential challenges we face with Glass: User experience Social awkwardness Privacy (or lack …
Apps exploiting Android “Master Key” bug offered on Google Play
Researchers from security firm Bitdefender have unearthed two relatively popular apps on Google Play that leverage the infamous Android “Master Key” bug, but …
Android backup sends unencrypted Wi-Fi passwords to Google
The recent revelations on how Internet giants such as Google, Yahoo, Apple and others are compelled by the US government to give its agencies access to user data have …
Featured news
Resources
Don't miss
- Balancing proprietary and open-source tools in cyber threat research
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management