Please turn on your JavaScript for this page to function normally.
Microsoft says Google also bypassed IE’s privacy settings

Following the discovery that Google and other online advertising companies are bypassing Safari’s default “no tracking” settings with specific code inserted …

Secret ad code allows Google to bypass Safari’s “no tracking” settings

Once again, Google has been caught doing something that it shouldn’t be doing: using code in their ads to intentionally bypass the privacy settings of Safari users in …

Active mobile botnet enslaves thousands of Android devices

A trojanized Android application for configuring phone settings has been enslaving the devices of the customers of China’s two largest mobile carriers into a botnet …

Chrome to stop using online checks to spot revoked certificates

Future versions of Google’s Chrome browser will no longer use online revocation checks to verify whether the HTTPS site the user wants to visit possesses a valid …

More bogus ad-serving Android apps evade Google’s Bouncer

Users searching for games on the official Android Market have lately been heavily targeted by ad-pushing scammers. First it was the fake Temple Run app, and now a string of …

Google reveals it is already scanning Android apps for malware

Even though most malicious Android apps are served from third-party app markets, cyber crooks occasionally manage to disseminate some via Google’s official Android …

Searching for Google Chrome can lead to malicious content

Searching for a link to download Google Chrome might result in a malware infection, warns a Websense researcher. According to him, if a user enters the term “Download …

Google+: The Missing Manual

If you want to gain more control over your social networking activities with Google+, this jargon-free guide helps you quickly master the ins and outs of the site. Learn how …

Online reputation manager suspected of Illegal code injection

For individuals and companies that have a bad online reputation, online reputation management (ORM) services might sound like a good investment. Such services are not illegal, …

Google tests QR code-based authentication

Google has apparently been testing an alternative to its two-step verification option for accessing Gmail and Google accounts, and it uses a QR code. The option is thought to …

Google Docs hosted phishing schemes abound

Google Docs is a helpful office suite and data storage service that allows users to collaborate on documents with ease but, unfortunately, it is also a very useful tool for …

Google admits profiting from ads for illegal sites

You should know by now that the fact that Google is serving you an advertisement does not mean that it’s safe to click on it. Time and time again examples of malware …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools