Please turn on your JavaScript for this page to function normally.
Use Google’s indexing capabilities to identify vulnerabilities

Next week at Black Hat, Stach & Liu researchers Francis Brown and Rob Ragan will show how the power of Google’s indexing capabilities can be harnessed to identify …

Google still grabbing more than just Wi-Fi devices’ MAC address?

Google is in for another privacy dispute, as it seems that its Street View cars have not been collecting only hardware IDs of detected Wi-Fi devices, but also the MAC …

Phishers target Google AdWords users

Trying to trick AdWords users into thinking that one of their income source is threatened, the phishers sent out emails with “Account has stopped running this …

Google warns users about active malware infection

Google has begun notifying its users that a particular piece of malware is installed on their computers by showing a big yellow notification above their search results (click …

Google+ related scams move to Facebook

Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their …

Analyzing and dissecting Android applications for security defects and vulnerabilities

In March 2011, 58 malicious applications were found in the Android Market. Before Google could remove the applications from the Android Market they were downloaded to around …

Scammers lure users with fake Google+ invites

Google recently opened for business a social network named Google+, and to avoid making mistakes that plagued the rollout of its predecessor Google Buzz, the company has …

Can the Google .co.cc ban be effective?

Google has recently decided to block all pages hosted on the .co.cc domain from appearing in its search results, and the move has sparked discussions. The search giant has …

Gmail to improve phishing email detection

Google has decided to introduce a small but hopefully effective change in the way it presents Gmail user with received emails. Starting from now, every time a user receives an …

iOS and Android more secure than PCs?

While the most popular mobile platforms in use today were designed with security in mind, these provisions are not always sufficient to protect sensitive enterprise assets …

Spammers push cloned apps on Android Market

No stone is left unturned, no option unexplored when it comes to online spamming, and the latest approach has shown that malware authors are not the only ones who have taken …

Chrome extension for identifying insecure code

In a bid to help developers keep their websites clear of security holes, Google has built – and offered for free – a (currently experimental) Chrome extension …

Don't miss

Cybersecurity news