Please turn on your JavaScript for this page to function normally.
Gogo in-flight WiFi service serves fliers fake Google certs

Gogo, a noted provider of in-flight broadband Internet service, has been spotted serving a fake Google SSL certificate to fliers trying to access YouTube, effectively …

Google starts blocking badly behaving Gmail extensions

How to deal with untrustworthy third-party add-ons that could endanger your own users? Prevent them from loading – if you can. That’s what Google recently did with …

Researchers confirm multiple Google App Engine security sandbox bypasses

Polish firm Security Explorations, which announced last week that they found over 30 serious security issues in the Java security sandbox of the Google App Engine (GAE), has …

Help Google design the Open Web of Things

Do you have an idea how the Internet of Things should work? You might want to share it with Google. The internet giant has long had an interest in IoT technologies, but is …

30+ bugs found in Google App Engine

Adam Gowdiak, CEO of Polish firm Security Explorations, has announced that his team of researchers have discovered over 30 serious security issues in the Java security sandbox …

Google simplifies CAPTCHAs down to a single click

Tired of solving CAPTCHAs? Google has just the thing for you. The company has introduced the latest iteration of its reCAPTCHA tool, and it most cases, it will allow users to …

Google open sources Firing Range, a test tool for web app security scanners

Google has open sourced another security tool: it’s called Firing Range, and it’s an effective testing ground for a variety of automated web application security …

Google open sources nogotofail, a network traffic security testing tool

In their quest to make users, the Internet, and digital devices in general more secure, a number of big Internet companies have recently announced a new collaboration that …

Malware directs stolen documents to Google Drive

Researchers have uncovered a new type of information-stealing malware that is apparently used in campaigns targeting government agencies and can syphon files from compromised …

2FA: Google offers physical alternative to verification codes

Google is offering an alternative second factor for its two-step account verification option, one that has the additional advantage of thwarting phishing attacks. It’s …

Google reports on “right to be forgotten” requests

Nearly a month after the release of the latest Google Transparency Report, which showed that government demands for user information have risen 150% over the last five years, …

Google triples Chrome bug bounties

Google has announced another change in its Chrome bug bounty: the maximum reward per bug has been tripled, and now stands at $15,000. “Due in part to our collaboration …

Don't miss

Cybersecurity news