Blog Posts Tagged with "Google"

0a8cae998f9c51e3b3c0ccbaddf521aa

WebMail and HTTPS - How Difficult Can It Be?

November 22, 2010 Added by:Rafal Los

Given the extreme hyper-focus on session theft through packet capture and replay - ahem, FireSheep - in sites like Twitter and FaceBook, it's interesting to see how difficult it is, or if its even possible, to enable HTTPS throughout a popular, high-traffic site that we use every day...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Report: Ten Most Vulnerable Applications for 2010

November 20, 2010 Added by:Headlines

The criteria for making the list require that the application be a consumer or end-user product that is not classified as being malicious by reporting outlets and which contains at least one critical vulnerability...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Google and Yahoo Allow Gov Surveillance For a Price

November 19, 2010 Added by:Headlines

Privacy advocate Christopher Soghoian did some snooping of his own through the Freedom of Information Act and found that Google charged the DEA $25 per case for access to user data. Yahoo, in an ongoing to effort to best Google at something, charged the agency $29 per case...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Wants More Access to Internet Communications

November 17, 2010 Added by:Headlines

Creating systems to easily and quickly un-encrypt data could produce a threat to sensitive information that would otherwise remain secure. The widely publicized Aurora attacks originating in China used back-doors that were originally created to give the government easy access to communications..

Comments  (0)

37d5f81e2277051bc17116221040d51c

Google Ordered to Produce Name of Cyberstalker

November 15, 2010 Added by:Robert Siciliano

Information Week reports that a New York judge has ordered Google to reveal the identity of a cyberstalker who has anonymously posted video and messages on the Internet. The videos included sexual slurs and damaging information that could affect the woman’s reputation and career...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Koobface Botnet Server Disabled - For Now

November 13, 2010 Added by:Headlines

Koobface, on the scene since 2008, has been one of the most notoriously successful botnet operations ever tracked, though not necessarily the most insidious, as the network has never sought to capitalize on its full potential...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FCC Slow to Respond to Google WiFi Snooping

November 11, 2010 Added by:Headlines

The discovery that volumes of data were so readily available should be a wake up call to businesses and individuals who leave their WiFi systems unsecured, and should also prove to demonstrate the government's willingness to probe such violations of privacy...

Comments  (0)

7e6249b5c7f6b63c28587c820b16edcb

Google Street View and Unencrypted Wi-Fi: Not a Hazard

October 25, 2010 Added by:Robert Gezelter

The effort being focused on Google would be far better spent on educating users about the hazards. Google is caught being an identifiable target. The Street Wise vehicle cruising down the block every few years is not a serious hazard to privacy and security...

Comments  (1)

D13f77e036666dbd8f93bf5895f47703

Should the U.S. Ban Google Street View?

October 01, 2010 Added by:Theresa Payton

Connecticut's Attorney General, Richard Blumenthal, is representing a 37-state coalition in the US. The coalition is looking into the privacy and security issues with Google Street View, especially related to their data collection from personal and company Wi-Fi networks without permission...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Choosing Your OS is NOT a Security Control

June 23, 2010 Added by:Brent Huston

Just a quick note on the recent Google announcement about dumping Windows for desktops in favor of Linux and Mac OS X. As you can see from the linked article, there is a lot of hype about this move in the press. Unfortunately, dumping Windows as a risk reducer is just plain silly.

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Google's SKIPFISH Application Scanner

June 06, 2010 Added by:Brent Huston

Our team had the opportunity to test Google’s recently released web application scanner known as SKIPFISH. Touted as an active reconnaissance tool, SKIPFISH claims to present an interactive site map for a targeted site by performing a myriad of recursive crawls and discretionary based probes.

Comments  (0)

63a7769efbcc83107e5e385ccc6429de

Google is phasing out Windows

June 04, 2010 Added by:Anton Aylward

According to a report in the Financial Times, Google are phasing out the use of Microsoft's Windows within the company because of security concerns. Citing several Google employees, the FT report reports that new hires are offered the option of using Apple Mac systems or PCs running Linux. The move is believed to be related to a directive issued after Google's Chinese operations were attacked in J...

Comments  (0)

85ac6feb584b665e85664974c546cfec

Google was capturing your wireless packets

May 18, 2010 Added by:Ray Tan

Last month the German government decided that it needed to take a closer look into Google's data collection methods. Google's Street View cars are equipped with wireless antenna's and pick up any available wireless signal along the way. It was originally thought that the Street view cars were just collecting SSID and MAC address to provide location based services to mobile users. It turns out that...

Comments  (13)

37d5f81e2277051bc17116221040d51c

Google Hack Whacks Passwords

April 30, 2010 Added by:Robert Siciliano

Code named Gaia after “Greek Goddess of Earth” a Google single sign on password system was hacked in December. Google is a significant part of many individuals and businesses online activities. Millions rely on Google every day to be fast, functional and most important, secure. A breach such as this may erode the confidence of Google users, but for many, they have all their egg...

Comments  (2)

1f2f664e68a603b3c54890fbbcd37857

What price privacy?

April 26, 2010 Added by:Mark Gardner

In recent months, there has been Google and now Facebook vying to use our data on the Web. Google were the first with their Buzz product, using all our Gmail contacts to start a social network.  This received a heavy amount of criticism for its invasion of privacy, from which, in my opinion, it has never fully recovered.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Social Media and Identity Theft Risks PT II

March 30, 2010 Added by:Robert Siciliano

Now that the 3 major search engines Google, Bing and Yahoo index real-time search for Twitter and other social networks, consumers and employees must be aware that not all relevant search is a safe click. Scammers and identity thieves see this as real-time free advertising for their malware.

Comments  (2)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked