Tag Archives: google

Google’s parent enters cybersecurity market

      Comments Off on Google’s parent enters cybersecurity market

Google’s parent company Alphabet has unveiled a new cybersecurity operation. The new venture, which trades under the name of Chronicle, will market security software to blue chip customers in an attempt to cash in on a cybersecurity market that is estimated to be worth $100 billion. Chronicle is based on… Read more »

Share

Chips compromised by Spectre and Meltdown bugs

      Comments Off on Chips compromised by Spectre and Meltdown bugs

By now you’ve heard plenty about Meltdown and Spectre, but this article by Bleeping Computer goes into a bit more technological detail about the background to the bugs, how they might be resolved, and the potential harm they can cause. Google has discovered that just about every Central Processing Unit… Read more »

Share

Google releases several critical fixes

      Comments Off on Google releases several critical fixes

Amongst the fifty fixes recently issued by Google for its Pixel and Nexus devices, one rated ‘critical’ rectifies an encryption bug in Qualcomm closed-source components. Of the five other patches rated ‘high’, four deal with glitches that potentially allowed denial of service attacks and the fifth resolves an elevation of… Read more »

Share

Google launches malvertising counter attack

      Comments Off on Google launches malvertising counter attack

In order to prevent its users from being steered onto bogus websites, Google is planning on launching three new Chrome security features in early 2018 – designed to counter the wave of malicious ads infesting its systems. This kind of malvertising-based URL redirection uses JavaScript code installed in iframes embedded… Read more »

Share

Google introduces new app vetting scheme

      Comments Off on Google introduces new app vetting scheme

In response to a number of recent phishing attacks, Google is beefing up its defences by unveiling a new ‘unverified app’ screen that instructs users and developers to tread carefully. This will replace the current ’error’ page that warns against opening dodgy apps and attachments. While users are still at… Read more »

Share

Google declares war on phishing

      Comments Off on Google declares war on phishing

Give a man a fish and you’ll feed him for a day; teach a man to phish and he’ll make millions from ransomware and identity fraud. Phishing is well-known threat and nobody is safe – not even one of the largest corporations on the planet. Google is the latest high… Read more »

Share

Mixed results on Google security

      Comments Off on Mixed results on Google security

Are you a glass half-empty or glass half-full kind of person? How would you rate the following story then? The fact that 50% of Google’s Android devices have now received much-needed security updates is good news. However, the fact that the other 50% remains unpatched is hardly reassuring. Google is… Read more »

Share

Google misdiagnoses NHS as botnet

      Comments Off on Google misdiagnoses NHS as botnet

As one of the world’s largest employers with 1.2m staff, the NHS tends to have a lot of people using Google at any one time – clinicians in particular (which in our mind raises another set of questions…). It must have come as a shock, therefore, when Google decided to… Read more »

Share

Google suffers record hack

      Comments Off on Google suffers record hack

Security firm Check Point has found that more than a million Android users have been put at risk by malware that allows hackers to root their devices remotely – and the number is rising at a rate of 13,000 each day. The Gooligan malware has been affecting Google’s Android devices… Read more »

Share

AI is the future of cyber security

      Comments Off on AI is the future of cyber security

We ought to change our attitude to computer security risk, says Google’s Adrian Ludwig. Instead of trying to eliminate risk, we should aim to manage it. In the same way that credits cards do, we should be using data to build a different risk profile for each individual user. The… Read more »

Share