Your name as a Google AdWord
It used to be that advertisers were forbidden from using proper names as Google AdWords, but not anymore. Forbes writer Kashmir Hill discovered that while searching her own …
Improvements to Google’s privacy policies
Following an audit at Google’s London office, the Information Commissioner’s Office (ICO) believes Google has taken reasonable steps to improve its privacy …
Adobe acknowledges the 80 Flash Player bugs found by Google
Following Adobe’s latest release of patches for a number of its products, a discussion was started by Google researcher Tavis Ormandy who claimed that he himself has …
Search engine hack innovation
Attackers are increasingly leveraging the power of search engines, like Google, to successfully carry out automated cyber attacks against vulnerable websites, according to …
Android malware answers calls, eavesdrops on users
Android users are two-and-a-half times as likely to encounter malware today than just six months ago, say the recently revealed results of an extensive analysis by Lookout. …
Android app for confidential messaging
VaporStream announced its Android application, available for free to users in the Android Market. The app allows VaporStream customers to communicate without fear of …
Google to acquire Motorola Mobility
Google and Motorola Mobility announced that they have entered into a definitive agreement under which Google will acquire Motorola Mobility for $40.00 per share in cash, or a …
US officials incessantly targeted with phishing emails
Remember the phishing attack against government officials and political activists that was disrupted by Google in June? Well, it’s far from over. The goal remains the …
4,300+ compromised WordPress blogs poison Google Image Search results
Google Image Search has for a while now been littered with images that lure users to compromised sites that serve as doorway pages to other malicious sites. Part of the …
SMS spying Android Trojan triggered by keywords
Another week, another trojanized Android app. And, according to Trend Micro researchers, this one has a functionality that differentiates it from similar previous ones: it …
Use Google’s indexing capabilities to identify vulnerabilities
Next week at Black Hat, Stach & Liu researchers Francis Brown and Rob Ragan will show how the power of Google’s indexing capabilities can be harnessed to identify …
Google still grabbing more than just Wi-Fi devices’ MAC address?
Google is in for another privacy dispute, as it seems that its Street View cars have not been collecting only hardware IDs of detected Wi-Fi devices, but also the MAC …
Featured news
Resources
Don't miss
- Solana’s popular web3.js library backdoored in supply chain compromise
- How widespread is mercenary spyware? More than you think
- Product showcase: Securing Active Directory passwords with Specops Password Policy
- PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785)
- SafeLine: Open-source web application firewall (WAF)