Read more about Google
Bookmark and Share
  • Sophisticated Google Drive phishing campaign persists

    22.05.2014

    Symantec researchers are once again warning about a sophisticated and persistent phishing campaign targeting Google users.

  • Google adds new security features to Google Apps

    19.05.2014

    Here is some welcome news for Google Apps Business, Government and Education customers: the company has implemented three new security features to protect them from phishing, hacking, and state-sponsored intrusions: Mail routing, delivery controls and SMTP relay serviceóControl the flow of information to and from your company with policy-based routing to ensure that company messages are filtered, even if they are sent from third-party or other non-Gmail sources.

  • Google, Facebook combat tech support advertising scams

    16.05.2014

    TrustInAds.org, a new organization founded by AOL, Facebook, Google and Twitter aimed at protecting people from malicious online advertisements, has issued a report that shines light on how online advertising platforms are combating tech support advertising scams that attempt to infiltrate a personís computer.

  • Tech companies and privacy practices: Who has your back?

    16.05.2014

    The Electronic Frontier Foundation (EFF) has published its fourth annual "Who Has Your Back" report that aims to show which major technology companies are good at protecting your data from government requests.

  • Why Google prefers numeric CAPTCHAs

    12.05.2014

    Alphanumeric CAPTCHAs - those more or less difficult-to-read combinations that are used by many online services to discern whether a user is human or a bot - have been in use for over 15 years now, but I've yet to meet a person who likes "solving" them.




Spotlight

Most popular Android apps open users to MITM attacks

Posted on 21 August 2014.  |  An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused for executing MITM attacks, and occasionally additional ones, as well.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Aug 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //