Google

Google - News, Features, and Slideshows

Most popular

Google in pictures

News about Google
  • Router malware: Fact or fiction?

    By Ronald Kaplan, Dylan Kaplan | 29 August, 2014 04:31

    Malware affecting a computer's operation is not always found in the computer itself. Just recently we encountered a common operational issue on several computers in our home network. Various browsers on different computers running different operating systems were intermittently redirecting webpages. The issue manifests itself by redirecting webpages to an unfamiliar merchant site.

  • Spotting Web threats in the confusion of short-lived hostnames

    By Antone Gonsalves | 28 August, 2014 22:51

    Researchers have found that the vast number hostnames constantly changing on the Web for legitimate purposes creates a cover for cybercriminals and weakens the effectiveness of security controls.

  • Callas Responds to Green's Criticisms

    By David Heath | 27 August, 2014 15:23

    A few days ago, Matthew Green, the widely respected cryptographer and research professor at Johns Hopkins University launched a broadside against PGP. In summary, Green said, “The problem with this is that, for all the good PGP has done in the past, its a model of email encryption thats fundamentally brokenrdquo; Further Green said PGP keys suck, PGP key management sucks and that that there is no forward secrecy. His blog post adds more criticisms and also attempts to find some solutions.

  • Feds issue bulletin warning about malicious 'Google dorking' cyber actors

    By Darlene Storm | 27 August, 2014 02:40

    If you are good at research by using Google searches, does that make you a malicious cyber actor? Of course not, but DHS, FBI and NCTC (National Counterterrorism Center) have issued a bulletin warning about malicious "Google dorking" cyber actors. If using advanced search techniques on Google or Bing is considered suspicious, what does that make Shodan users who specifically target SCADA, ICS, VoIP, routers, switches, webcams and printers to name but a few?

  • Firefox OS to outdo Android on granular application permissions

    By Lucian Constantin | 27 August, 2014 00:01

    Future versions of the Firefox OS mobile platform will allow users to control application-specific permissions, a feature with both privacy and security benefits that's missing on Android.

Tutorials about Google
Features about Google
  • Is the open floor plan trend a data security headache?

    By Larry Ponemon | 26 August, 2014 03:30

    Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. Companies like Facebook and Google market their open-office floor plans to potential employees, touting that the design allows workers to work closely together and fosters a culture of collaboration.

  • Why your online identity can never really be erased

    By Taylor Armerding | 05 August, 2014 05:37

    One seemingly unshakeable truth about the online world since it began is this: The Internet never forgets. Once you post anything online, it is recoverable forever -- the claims of former IRS official Lois Lerner about "lost" emails notwithstanding. Even promises of photos disappearing after a few seconds have been shown to be bogus.

  • Google's move into home automation means even less privacy

    By Jaikumar Vijayan | 27 June, 2014 04:58

    Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.

  • With Android L, Google makes pitch for enterprise users

    By Matt Hamblen | 26 June, 2014 06:59

    Google will provide enterprise-focused security and management features to its entire Android showcase of mobile devices, including features reserved only for Samsung devices running Samsung security software called Knox, a Google executive announced during the Google I/O keynote address Wednesday.

  • Is EU's 'right to be forgotten' really the 'right to edit the truth'?

    By Sharon Gaudin | 15 May, 2014 06:23

    With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Audit Management Solutions

Manage the complete audit lifecycle from audit universe identification and risk assessment to management/board reporting and quality assurance.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.