Starting from September 1st, 2015, Google will disable Flash’s ability to auto-play in its Chrome browser. What will change for advertisers? Google is going to disable Flash’s ability to auto-play in Chrome, the change will be introduced starting from September 1, 2015. Since this date, non-important Flash files will need explicit user’active to play in the browser. […]
MWR Labs have disclosed information on an unpatched vulnerability that allows an attacker to easily bypass the Android sandbox. Other problems for the popular Android OS, after the discovery of the Stagefright vulnerabilities and other security flaws recently revealed by security researchers, now experts at MWR Labs have disclosed information on an unpatched vulnerability that allows […]
Researchers from Trend Micro discovered a new critical vulnerability in the Android mobile OS that can be exploited to crash mobile devices. Experts from Trend Micro discovered a new vulnerability, an integer overflow bug in the Android mediaserver service, that affects versions of Android starting with 4.3 Jelly Bean and up to 5.1.1 Lollipop. The flaw […]
Experts discovered a new Google Drive phishing campaign in which the threat actors deployed phishing web pages on Google Drive. Once again phishers exploited Google’s reputation running a phishing campaign aimed to steal user Google credentials and access to the multitude services offered by the company. The new phishing campaign was discovered by the security […]
Android users are threatened by a new vulnerability dubbed Stagefright in the popular Google mobile OS, which allows hackers to gain control of the system without raising suspicion. Another disconcerting aspect of the Stagefright flaw is that it potentially affects 95% of Android devices running version 2.2 to 5.1 of the Google OS (roughly 950 million smartphones […]
Hackers are using a new search engine poisoning method to circumvent Google’s page ranking-algorithms, the technique relies on PDF documents. Researchers from Sophos discovered the new search poisoning method used to circumvent cloaking-detection mechanisms implemented by Google. The experts found hundreds of thousands of unique PDF documents per day implementing the poisoning technique. The term cloaking indicates the […]
The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not available on the Chrome Web Store. The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not available on the Chrome Web Store. With new policies […]
The Conservatives are planning new laws to give MI5 the power to force IT giants to hand over encrypted messages from terror suspects. Potential global terrorism threats are persuading to Conservatives in UK to move the pieces of chess by law; in advance of the world’s biggest internet companies, such as Google, Apple and Facebook […]
Security researchers at Security Explorations firm have published PoCs code for some of security issues in the Google App Engine. The Polish firm Security Explorations has published online the technical details and a proof-of-concept code for security flaws affecting the Google App Engine (GAE) for Java. “Security Explorations decided to release technical details as well as […]
A Google study on Ad injection activities revealed that more than 5% of unique IPs visiting Google-owned websites had at least one ad injector installed. According to a new report published by Google 5.5% of unique daily IP addresses visiting google-owned websites have at least on ad injector installed, superfish.com is the most popular, being […]