Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
Your name as a Google AdWord

It used to be that advertisers were forbidden from using proper names as Google AdWords, but not anymore. Forbes writer Kashmir Hill discovered that while searching her own …

Improvements to Google’s privacy policies

Following an audit at Google’s London office, the Information Commissioner’s Office (ICO) believes Google has taken reasonable steps to improve its privacy …

Adobe acknowledges the 80 Flash Player bugs found by Google

Following Adobe’s latest release of patches for a number of its products, a discussion was started by Google researcher Tavis Ormandy who claimed that he himself has …

Search engine hack innovation

Attackers are increasingly leveraging the power of search engines, like Google, to successfully carry out automated cyber attacks against vulnerable websites, according to …

Android malware answers calls, eavesdrops on users

Android users are two-and-a-half times as likely to encounter malware today than just six months ago, say the recently revealed results of an extensive analysis by Lookout. …

Android app for confidential messaging

VaporStream announced its Android application, available for free to users in the Android Market. The app allows VaporStream customers to communicate without fear of …

Google to acquire Motorola Mobility

Google and Motorola Mobility announced that they have entered into a definitive agreement under which Google will acquire Motorola Mobility for $40.00 per share in cash, or a …

US officials incessantly targeted with phishing emails

Remember the phishing attack against government officials and political activists that was disrupted by Google in June? Well, it’s far from over. The goal remains the …

4,300+ compromised WordPress blogs poison Google Image Search results

Google Image Search has for a while now been littered with images that lure users to compromised sites that serve as doorway pages to other malicious sites. Part of the …

SMS spying Android Trojan triggered by keywords

Another week, another trojanized Android app. And, according to Trend Micro researchers, this one has a functionality that differentiates it from similar previous ones: it …

Use Google’s indexing capabilities to identify vulnerabilities

Next week at Black Hat, Stach & Liu researchers Francis Brown and Rob Ragan will show how the power of Google’s indexing capabilities can be harnessed to identify …

Google still grabbing more than just Wi-Fi devices’ MAC address?

Google is in for another privacy dispute, as it seems that its Street View cars have not been collecting only hardware IDs of detected Wi-Fi devices, but also the MAC …

Don't miss

Cybersecurity news