Google

(get it in RSS or Atom)

Google paves the way for Glass; throws lobbyists in front of distracted-driver legislation

Google paves the way for Glass; throws lobbyists in front of distracted-driver legislation

Google has hired lobbyists in at least three US states to battle proposed restrictions on driving with headsets such as Google Glass.

Are you safe against mobile threats? Check out our tips for keeping the crooks away...

mstr-250

Do you use a mobile device? (Of course you do!)

Read Sophos researcher Vanja Svajcer's paper, "Mobile Security Threat Report," and check out our expert tips for keeping the crooks away...

Woman claims to have been attacked for wearing Google Glass

Sarah Slocum. Image courtesy of Facebook.

The scorn for glassholes has apparently now gone too far, having evolved into what might be the first violent action taken against a Glass wearer.

Google acquires sound authentication start-up SlickLogin

slicklogin-CC-250

Just five months after the company's launch, SlickLogin has announced its acquisition by Google. The Israeli security start-up has developed a method of authenticating your smartphone using an inaudible sound wave transmitted from your computer.

Patching XP, Flappy Bird malware, Tesco passwords leaked - 60 Sec Security [VIDEO]

2014-02-15-really-250

Did you really think XP would go patch-free? Is Flappy Bird really dead? Did you really use the same password on more than one site?

60 Sec Security - 15 Feb 2014

Flappy Bird really *is* dead - beware of infected fakes that promise to keep him alive!

flapp-icons-250

News about celebrities to do with births, deaths and marriages often prove to be handy hooks for cybercrooks.

So when the ultra-popular game Flappy Bird was withdrawn recently, the crooks wasted no time pretending to keep him alive...

NYPD tests Google Glass as they mull becoming Robocops

NYPD tests Google Glasses as they mull becoming Robocops

Just by looking at suspects, police could instantly check out their arrest records, mugshots and other key information. Of course, they could also record everything and everybody they see, regardless of whether they have a warrant or reasonable suspicion of wrongdoing.

Google Chrome will warn you when it's been hijacked

Google Chrome will warn you when it's been hijacked

The warning flare comes as a window for Windows users that features a "reset" button to get the browser back to factory-fresh settings.

Microsoft, Facebook, Google and Yahoo release NSA snooping stats

Microsoft, Facebook, Google and Yahoo release NSA snooping stats

The US government had a change of heart regarding disclosure of NSA surveillance requests. Tech companies including Facebook, Microsoft, Google, and Yahoo have duly let loose the goods - but six months stale with scant details.

SSCC 133 - Prize unicorns, Android malware, 2FA, Attack reports and Vote For Us! [PODCAST]

sscc-133-thumb-250

Chet and Duck review the week's news in their informed and entertainingly serious style, discussing the prizes on offer at this year's PWN2OWN competition, talking about a new twist in Android malware, and reviewing the latest attack reports from Yahoo and Target...

PWN2OWN 2014 - Find the "exploit unicorn" and win $150,000

unicorn-250

It's called PWN2OWN because if you successfully pwn, or hack into, the competition laptop, you own it *literally* - you get to take it home with you.

But there's also $645,000 in cash up for grabs, including a Grand Prize for finding, wait for it, an "exploit unicorn"...

Another breach, sneaky Android malware, and the Privacy Plan Diet - 60 Sec Security [VIDEO]

2014-02-01-3-step-250

Surely not another payment card breach? Android malware that jumps the airgap? And what's this about a Privacy Plan Diet?

60 Sec Security - 01 Feb 2014.

Android banking malware with a twist in the delivery

Here's an intriguing tale of an Android malware curveball spotted recently in SophosLabs.

You're expecting the pitch to come at you in a predictable direction, but a hidden twist in the action brings the onslaught from another angle altogether...

The power of two - All you need to know about two-factor authentication

2FA

What can we do to protect ourselves from stolen password databases, phishing attacks, keyloggers or credit card skimmers installed in our local ATMs? We can start with two-factor authentication. This article tells you what it is, how it works and where you can use it.

Spy agencies are slurping personal data from leaky mobile apps

Spy agencies are slurping personal data from leaky mobile apps

Beyond device details, data shared over the internet by iOS and Android apps can include personal information such as age, gender, and location, while some apps share even more sensitive user information, such as sexual preference.

Bug, not DDoS, took down US court systems - just like Gmail

Bug. Image courtesy of Shutterstock.

Several US judicial system websites were offline for a spell on Friday, prompting immediate worries of some kind of organised cyber assault aimed at bringing the nation's legal system to its knees.

Oracle and Java, Apple and the FTC, Google and privacy - 60 Sec Security [VIDEO]

2014-01-18-thermostat-250

Why was this month's Java update a "must patch"? Should in-app purchases be allowed to target children? Is it a good idea to give Google control of your home?

Find out in 60 Second Security for 18 Jan 2014

Google pays $3.2 billion for Nest, a smart-home gadget maker

Google pays $3.2 billion for Nest, a smart-home gadget maker

The money gets Google the keys to our smart homes. Nest is, after all, plugged into the internet of all things with its smart thermostats and smoke alarms. The question now is, Say WHAT? Does that mean Google's going to know even more about us than it already does?!

Stalker-friendly app, NameTag, uses facial recognition to look you up online

Stalker-friendly app, NameTag, uses facial recognition to look you up online

Smartphone and Google Glass wearers using the new app will be able to act as a real-time online search that pairs facially recognized images with social media profiles and other online photos and content.