Please turn on your JavaScript for this page to function normally.
“Confidential document on Google Docs” leads to account hijacking

A simple phishing scam aimed at harvesting users’ Google credentials is hitting inboxes around the world, warns Hoax-Slayer. “Please view the document i uploaded …

Google unveils site to help webmasters recover their hacked sites

As the most widely used Internet search engine, Google Search is the de-facto starting point for hundreds of millions of queries each day. It you are an administrator of a …

Google reports on non-court ordered FBI data requests

With every new Transparency Report that Google releases biannually since 2009, new information about data requests from government agencies are included. This last report, …

Scammers use Google glasses as lure

The great interest that the upcoming release of Google glasses has generated in the public is being actively exploited by cyber scammers, warns Trend Micro. Counting on the …

CloudLock unveils Community Trust Rating

CloudLock unveiled the Community Trust Rating as part of its Cloud Information Security Suite at RSA Conference 2013. The third-party application trust assessment system uses …

Google 2-step login verification flaw allows account hijacking

Duo Security researchers have found an easy way to bypass Google’s two-step login verification by capturing a user’s application-specific password. “To make …

Google account hijacking dramatically reduced

Google employs many security measures to thwart would-be Google account hijackers, and not all are highly visible as the two-factor authentication option introduced in 2010 …

Myanmar journalists targeted with state-sponsored Gmail attacks

Google has recently begun warning Myanmar journalists and editors about their Gmail accounts potentially being targeted by state-sponsored attackers. The warning – first …

Bogus cleaning apps on Google Play install backdoor on PCs

Malicious Android apps able to infect and set up a backdoor on PCs running pre-Windows 7 operating systems have been recently spotted by researchers of several security …

Ad network site hack results in popular sites flagged as malicious

Google Chrome users trying to visit a slew of popular news sites such as the New York Times, the Washington Post, ZDNet and the Huffington Post on Monday were faced with …

The effectiveness of bug bounty programs

Veracode released an infographic that examines the success of bug bounty programs. The past decade has witnessed major growth in demand for bug hunters, with online giants …

Google offers over $3M for breaking Chrome OS

With $3.14159 prize pool and a completely new target, Google’s Pwnium contest has become an even greater challenge for security researchers out to make a buck from their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools