Please turn on your JavaScript for this page to function normally.
Fraudulent digital certificate for Google web properties used in active attacks

A fraudulent digital certificate that could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against several Google web properties has …

Facebook and Google+ are prime targets for easy attacks

The law created to protect children’s online privacy actually increases risk, according to new research from Polytechnic Institute of New York University (NYU-Poly). The …

Fake versions of popular Apple apps sold on Google Play

If you are an Android user but you want to try out some of Apple’s most sought-after apps, you might be surprised to know that Apple has been seemingly offering them for …

Google Chrome App grabs identities, forges blogs in victims’ name to promote scam

A Google Chrome app that promises to change the color of Facebook accounts instead nabs authentication cookies and generates dozens of blogs registered to the victims’ …

Android 4.2 blocks premium rate messages and verifies third-party apps

Google has recently released its latest Android version, and the first devices to run it – Samsung’s Nexus 10 and LG’s Nexus 4 – will be released a …

Weak crypto allowed spoofing emails from Google, PayPal domains

Zach Harris, a Florida-based mathematician, discovered that Google and many other big Internet companies use weak cryptographic keys for certifying the emails sent from their …

First application firewall for Google Apps

CloudLock launched CloudLock Apps Firewall, which helps enterprises discover, classify and enable trusted third party mobile and web apps that require access to users’ …

Google alerts users about new state-sponsored attacks

Remember when in June Google announced its intention to start warning Gmail users that their account might be targeted by state-sponsored attackers? A clear warning above the …

Chrome 22 released, researchers awarded $30K in bug bounties

Chrome v22 has been released, and with it over 40 vulnerabilities – 15 of which high-severity – have been closed. Google’s reward program for the responsible …

Google Go programming language used for creating destructive Trojan

When Google introduced its Go programming language in 2009, they surely didn’t hope for it to be used for writing malware but, as these things go, it was a only a matter …

Google adds Do Not Track support to Chrome

The next official release of Google’s Chrome browser will more than likely support the Do Not Track (DNT) initiative by sending the DNT HTTP header to websites if the …

Zero-day-loving Google hackers furiously active in last three years

The hackers behind the Aurora attacks that were discovered targeting Google, Adobe and other big U.S. companies in 2009 have seemingly been working hard ever since. Symantec …

Don't miss

Cybersecurity news