Google decided to switch on default HTTPS for its free domain service provider Blogspot, the migration will be easy and transparent for the users. After WordPress also Google decided to switch on default HTTPS for its free domain service provider Blogspot. The measure will impact millions of users of the popular platform. Since September 2015 Google had introduced […]
Patches for 40 high and medium severity vulnerabilities have been included in Googleâs May 2016 security update for the Android operating system. Patches for 40 vulnerabilities have been included in Googleâs May 2016 security update for the Android operating system. Many high and medium severity vulnerabilities, in addition to one low severity vulnerability, are patched […]
According to Google, Google is a âpartially dangerousâ website because some pages on google.com contain deceptive content. According to Googleâs online transparency report, Googleâs main search engine is a âpartially dangerousâ website. The company has advised that people should exercise caution when using it. The search engine could attempt to steal the personal information of […]
Google has issued a new security update for its Chrome 49 that patches a number of flaws, most of them discovered by external researchers. Google has updated Chrome 49 for all the available versions in order to patch several critical vulnerabilities, including the flaw discovered thanks its bounty program that were rewarded with dozen thousands of […]
A large percentage of Android devices is affected by security vulnerabilities that could be exploited by attackers to easily gain a Root Access. According to experts at TrendMicro a large percentage of Android devices in use today is affected by security vulnerabilities that could be exploited by attackers to easily gain a root access. The attack allows an ill-intentioned […]
The Portuguese cyber security expert David Sopas has discovered a Reflected File Download (RFD) vulnerability affecting Google Finance. The researchers explained that different from other similar Reflected File Download he discovered in the past, this time, the attackers donât need to create a page to force the download. “Found this vulnerability when auditing other client. With this RFD you donât […]
The FBI raided another the second home in Chicago to arrest the second alleged culprit in the Fappening hack Investigation. In 2014 an unknown hacker leaked online nude pictures of celebrities, including the popular and Kate Upton. We are speaking about the case known as The Fappening, the hacker took over a large number of Apple iCloud accounts, […]
Google confirms that the next Android versions will use Oracleâs open-source OpenJDK instead the Java APIs, a strategic choice. Google is leaving Java application programming interfaces (APIs) in future versions of its mobile operating system Android. The company is planning to adopt as an alternative an open source solution. What is this OpenJDK? It is an […]
Findings of a research show that the Nest camera is still operating even after it has been disabled through the mobile application. People buy security cameras to have a higher level of control over their lives, but recently a research by a team at ABI Research found that users also must be worried about the […]
A security loophole in the official Gmail Android app opens the email spoofing attacks allowing anyone to change the sender email name. The independent security researcher Yan Zhu has discovered a serious security issue in the Gmail Android app allows ill-intentioned to send an email pretending to be someone else. Clearly a similar loophole could represent a […]