Highlights from the past seven days in information security include an Android banking trojan that not only has the ability to pose as Flash Player, but can also bypass 2FA security as well.
Search results for: "Google Play "
This malware masquerades as Flash Player, behaves like a screen locker, and can bypass two-factor authentication. This combination of features turns it into a powerful tool for stealing money from victims’ bank accounts.
Parisa Tabriz may not be a household name, but it's only a matter of time. We take a look at Google's Security Princess, who is changing the face of tech.
In order to help make Google Play a safer place for Android users, ESET continues to monitor the official Android app market for malicious or potentially unwanted applications.
ESET recently discovered an interesting stealth attack on Android users, an app that is a regular game but with an interesting addition: the application was bundled with another application.
At the Google I/O event in San Francisco, the company announced a number of changes to its Android mobile operating system, including the option to deny any app individual permissions.
Google has outlined the enhanced security credentials of the upcoming Android 5.0 - nicknamed Lollipop - in an official blog post.
Google is facing a threat of expensive legal action over the recent leaked naked celebrity photographs, according to IT Pro. The basis for the legal threat seems to be built on the idea that the search giant didn't do enough to prevent people seeing the photographs after the initial leak.
An image of a Russian car crash has piled up in Google Images - leading to speculation that the service has been hacked. What’s less clear is why, or who might have done it.
How are YOU supposed to remove your house from Google Street View if you don't like the idea that Google drove one of its Street Cars up your road, took a photo of your front door without your permission, and then published it on the net? Fortunately, there is a way...
Google is offering full refunds to buyers of the Virus Shield app which briefly topped the Android charts last week - but turned out to offer no protection whatsoever.
Google is to boost security on its Android devices, by continuously checking apps to see that they haven’t mutated into malicious Android malware, monitoring all apps on Android devices for suspicious behavior, according to PC World.
Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware has been demonstrated successfully on the eyepiece - despite Google’s policies explicitly forbidding such programs.
A futuristic app uses Google Glass to add an extra layer of privacy for users withdrawing cash from ATM machines - by displaying a one-time personal identification number (PIN) which only the Glass user can see.
Google has bought a company offering a new form of two-factor authentication - using “silent” sounds played via PC and smartphone speakers to verify a user is who he or she claims to be
Stepping up protection of the Apple ID falters as password reset bug emerges before two-step verification is fully implemented.
Sharing details of the hack that “wiped his life” has earned Mat Honan a place in the annals of information system security; the specific inter-dependence of flawed authentication systems that cost him so dearly–encompassing Apple, iCloud, Amazon.com, Gmail and more–would probably still exist if Mat had not gone public. Wired has the full story here
If you don’t remember the Rumble in the Jungle, it was a boxing match between George Foreman and Muhammed Ali. Back in 1974 names like Foreman and Ali were as famous as companies like Google and Facebook are now. Google, like the older Ali, has been taking punches in the early rounds of the social
Google, in an effort to get more squarely into the center of the social networking scene, is implementing a system where private profiles you may have created in Gmail will become public after July 31, or you risk account deletion. While the information on the profile that is made public will be limited initially, the
Yesterday I blogged about a security company that found a high percentage of apps for the iPhone and for the Android were stealing user information. I call it stealing because the user is not aware of what personal data is leaving their phone. At the Blackhat Security Conference in Las Vegas the same company, Lookout