Run Nessus on your Android device
Tenable has released an Android application for its Nessus Vulnerability Scanner, enabling Nessus users to remotely connect to a Nessus server, launch scans and review reports …
Gmail deactivation spam run leads to phishing forms on Google Docs
A week ago, F-Secure researchers have uncovered a number of spreadsheets with a form functionality that are apparently designed to act as phishing forms. Today, one of these …
Google disrupts phishing attack against government officials, political activists
An attack apparently coming from Jinan – the capital of China’s Shandong province – against personal Gmail accounts belonging to hundreds of users has been …
Auto-dialing Trojans migrate to Android devices
Auto-dialing malware has migrated from Symbian devices to Android ones, warns NetQin Mobile researchers. The Trojan has been spotted embedded in over 20 Android applications …
26 trojanized apps pulled from Android Market
26 applications containing a variation of the DroidDream Trojan have been found on the official Android Market and are believed to have been downloaded by at least 30,000 …
Phishing forms on Google Docs
Google Docs is a handy online service for creating various types of documents that are hosted by the company in their cloud and can be made accessible to the greater public. …
Apps with dangerous permissions pulled from Chrome Web Store
Do you trust Google to review and ban potentially malicious applications from its online stores? The Android Market has already been found offering “trojanized” …
Code in the Cloud: Programming Google AppEngine
Cloud applications are the next big shift in application development: instead of building single-user applications to run on a personal computer, new applications are being …
35 million Google Profiles collected into private database
If you are one of those individuals that made their own Google Profile, chances are that you knew and agreed to the fact that the information you included in it will be …
Google to fix Android flaw
Two days ago, a group of German scientists made public the fact that a Google authentication protocol flaw. The flaw makes it possible for malicious individuals to sniff out …
Google authentication protocol flaw endangers Android users
If you’re an Android user that has still not upgraded to the 2.3.4 and 3.0 version, you’re in danger of having the information contained in various Google …
Chromebook: A new class of risks
We are certainly living in interesting times. It was less than a week ago that a rumor appeared that Apple is going to switch to ARM processors for its next generation of …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act