The move is part of Google’s continued clampdown on adverts that are intended to hoodwink users
The company credits hardware-based two-factor authentication with practically eliminating the problem of phishing attacks that have targeted its own employees of late
This is bad news for many websites that have yet to embrace encrypted connections
Tech giant has 90 days to comply with ruling or faces further penalties over ‘anti-competitive’ practices
The move is intended to help address the mobile platform’s perennial problem – that many manufacturers of Android-powered devices are slow to get software updates out the door
The move is part of the company’s HTTPS-everywhere vision for the internet
If you're still running a website that is still using insecure HTTP then it's time to wake up and drink the coffee. Because unless you take action soon, you're going to find many of your visitors are going to distrust your website.
ESET researchers discovered 13 new Instagram credential stealers on Google play and looked into the motivations behind their fraudulent schemes.
ESET researchers have observed an increased number of apps on Google Play using social engineering techniques to boost their ratings, ranging from legitimate apps, through adware to malware.
18 years of Googling is certainly something to behold, but on this anniversary, ESET's Ondrej Kubovič is keen to highlight the cybersecurity threat.
On Thursday, September 12, Duo Security, a young-but-respected vendor of two-factor authentication devices, announced the preliminary results of a study of over 20,000 Android devices from a two month old study they performed. Based on the results, they calculated that over half of Android devices on the market have security vulnerabilities that are, as yet,
As soon as Microsoft had released patches for security bulletin MS12-037 (which patched 13 vulnerabilities for Internet Explorer) Google published information (Microsoft XML vulnerability under active exploitation) about a new zero-day vulnerability (CVE-2012-1889) in Microsoft XML Core Services. Sometimes vulnerabilities are discovered at a rate that outpaces the patching process and so a temporary fix
Do you use Google? These days the question sounds almost absurd. If you use the Internet, or an iPhone, or an Android phone, or a Kindle or an iPad, then of course you use Google in some shape or form. And if you take a keen interest in how your personal information is used, you