November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,636 hits
Tag Archives: Google
Eating 20% Fat Beef or 80% Lean Beef… A Google Android Problem
You know, it’s really how you frame something to make it sound almost appealing. Lots of grocery stores sell beef and it’s labeled as lean, but you know it has a lot of fat content if you were to flip … Continue reading
Posted in Security Blog
Tagged 2016, android, Google, MDM, metrics, Mobile Device Management, reporting, Security Awareness
Comments Off on Eating 20% Fat Beef or 80% Lean Beef… A Google Android Problem
Google/Boston Dynamics Humanoid Robots
Atlas is a humanoid robot. In the video, you can see it walking through the woods. Since they are Google owned, I wonder if they are running a version of Android… haha
Posted in Security Blog
Tagged 2015, android, Boston Dynamics, Google, killer robots
Comments Off on Google/Boston Dynamics Humanoid Robots
Rowhammer
Intel-compatible PCs running Linux are exploitable through the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-access memory) chips and gaining higher kernel privileges on the system. Google’s Project Zero has released an in-depth article on … Continue reading
Posted in Security Blog
Tagged ddr, DRAM, exploit, Google, how to exploit, Linux, project zero, rowhammer
Comments Off on Rowhammer
Smartwatch to Smartphone Data Interception
Data sent between a Smartwatch and an Android smartphone could be a subject to brute force hacks to intercept and decode users’ data, including everything from text messages to Google Hangout chats and Facebook conversations. Liviu Arsene explains. Read more … Continue reading
Posted in Security Blog
Tagged 2014, android, bluetooth, cyber risk, Google, nfc, risk, smart-watch, sniffing, video tutorial, wearables
Comments Off on Smartwatch to Smartphone Data Interception
SSL 3.0 POODLE
Google security researchers have disclosed a vulnerability in SSL 3.0 that allows attackers to determine the plaintext of secure connections. Attackers can use the flaw to trigger network faults to push browsers back to the 15 year-old platform. POODLE is … Continue reading
Posted in Security Blog
Tagged 2014, Google, man-in-the-middle, mitm, openssl, Padding Oracle On Legacy Downgraded Encryption, POODLE, ssl, tls, v3, vulnerability, vulnerable websites
Comments Off on SSL 3.0 POODLE
Zemot Malvertising
Google has confirmed that their ad technology foundation to create, transact, and manage digital advertising for the world’s buyers, creators and sellers; has been exploited to deliver malicious advertisements to millions of internet users that could install malware on a … Continue reading
Posted in Security Blog
Tagged 2014, ad, doubleclick, Google, malwarebytes, mcafee, symantec, windows defender, zemot
Comments Off on Zemot Malvertising
Google’s Driverless Car
Kawaii!! Here are some questions to ask though. What will become of the insurance industry if driverless cars become the norm? Will it still be mandatory in the US to have car insurance? What if someone hacks a car and … Continue reading
Posted in Security Blog
Tagged 2014, Curious Questions, driverless cars, Google, insurance
Comments Off on Google’s Driverless Car
Edward Snowden on Ted: Here’s How to Take Back the Internet
Makes you think differently about this bottle top. Read it from the perspective of the normal person, read it from the perspective of Edward Snowden, then read it from the perspective of the NSA.
Posted in Security Blog
Tagged 2014, AOL, Apple, boundless informant, Edward Snowden, ethics, Facebook, Google, Microsoft, NSA, PalTalk, Patriot Act, PRISM, Skype, ted, Yahoo, youtube
Comments Off on Edward Snowden on Ted: Here’s How to Take Back the Internet