Tag Archives: Google

Eating 20% Fat Beef or 80% Lean Beef… A Google Android Problem

You know, it’s really how you frame something to make it sound almost appealing. Lots of grocery stores sell beef and it’s labeled as lean, but you know it has a lot of fat content if you were to flip … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Eating 20% Fat Beef or 80% Lean Beef… A Google Android Problem

Google/Boston Dynamics Humanoid Robots

Atlas is a humanoid robot. In the video, you can see it walking through the woods. Since they are Google owned, I wonder if they are running a version of Android… haha

Posted in Security Blog | Tagged , , , , | Comments Off on Google/Boston Dynamics Humanoid Robots

Rowhammer

Intel-compatible PCs running Linux are exploitable through the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-access memory) chips and gaining higher kernel privileges on the system. Google’s Project Zero has released an in-depth article on … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Rowhammer

Smartwatch to Smartphone Data Interception

Data sent between a Smartwatch and an Android smartphone could be a subject to brute force hacks to intercept and decode users’ data, including everything from text messages to Google Hangout chats and Facebook conversations. Liviu Arsene explains. Read more … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Smartwatch to Smartphone Data Interception

Google Firing Range

Google Firing Range is an automated Web Application Security Scanner. Version 0.42, which was released Tuesday checks for Address DOM XSS Redirect XSS Reflected XSS Tag based XSS Escaped XSS Remote inclusion XSS DOM XSS CORS related vulnerabilities Flash Injection … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Google Firing Range

SSL 3.0 POODLE

Google security researchers have disclosed a vulnerability in SSL 3.0 that allows attackers to determine the plaintext of secure connections. Attackers can use the flaw to trigger network faults to push browsers back to the 15 year-old platform. POODLE is … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , | Comments Off on SSL 3.0 POODLE

Zemot Malvertising

Google has confirmed that their ad technology foundation to create, transact, and manage digital advertising for the world’s buyers, creators and sellers; has been exploited to deliver malicious advertisements to millions of internet users that could install malware on a … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Zemot Malvertising

Google’s Driverless Car

Kawaii!! Here are some questions to ask though. What will become of the insurance industry if driverless cars become the norm? Will it still be mandatory in the US to have car insurance? What if someone hacks a car and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Google’s Driverless Car

Edward Snowden on Ted: Here’s How to Take Back the Internet

Makes you think differently about this bottle top. Read it from the perspective of the normal person, read it from the perspective of Edward Snowden, then read it from the perspective of the NSA.

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Edward Snowden on Ted: Here’s How to Take Back the Internet