blog trackingRealtime Web Statistics Google Archives - Page 2 of 19 - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Google’

Google might reward secure websites with better ranking


Vulnerabilities in present encryption techniques and attacks in present websites gave a huge effect on internet. So, INTERNET SEARCH AND ADVERTISING HULK Google is considering giving websites that use strong encryption preferential placement on its search listings. Matt Cutts, Google senior engineer has hinted at this. Cutts was talking at the SMX West conference in San Jose, California, when website hacking came up and he talked about Google responses to it. He said that rewarding secure websites will save Google time whenever a fresh security panic sweeps the internet. “We don’t have the time to maybe hold your hand and …continue reading

For more information go to, http://www., or

The post Google might reward secure websites with better ranking appeared first on National Cyber Security.

View full post on National Cyber Security

FireEye made Google to install patche against a malware that sending victims to phishing sites


bl A malicious Android application spotted by FireEye – security vendor, that could modify the icons of other applications so that when they’re launched, they send victims to a phishing website. Google has issued a patch for that. The user give application permissions thought to have no malicious possibilities. Android users aren’t warned about granting those permissions when they install an application, FireEye wrote. But “using these normal permissions, allow malicious application to modify configuration settings of Android’s Launcher, including that of icons. FireEye developed a proof-of-concept attack using Google’s Nexus 7 tablet running Android version 4.2.2 to show icons …continue reading

For more information go to, http://www., or

The post FireEye made Google to install patche against a malware that sending victims to phishing sites appeared first on National Cyber Security.

View full post on National Cyber Security

Google Increased Android Security


Malware based attacks on android devices are increasing day by day, hundreds of android based malware are being sold in dark web , Anti virus firms are mostly failed in detecting them as Cyber criminals keep on changing Payload’s signature. According to Symantec’s Internet Security Threat Report 300+ android based malware were discovered only in 2013 , Threat of compromising android devices is being increased day by day. Recently google have planned to boost up andoid device security, google is going to launch a new system according to which every android app installed in android device will be check before …continue reading

For more information go to, http://www., or

The post Google Increased Android Security appeared first on National Cyber Security.

View full post on National Cyber Security

Google Kills ‘Hit No. 1 on Play Charts’ Fake Anti-Virus App

‘Google play’ an app store of Android checks for malicious app by default when uploaded whether that’s downloaded for free or takes some money. Google doesn’t confirm that it is functional or not and that gave a developer to make a fake app and earn money.
A fake anti-virus app named as “Virus Shield” was caught by Android Police and was bump off by google instantly. An app with no-functionality yet that app was no: 01 hit in app store. It did nothing like detecting and deleting viruses but just turning icon change when tapped that pretends that it’s checking for viruses.
Beside many claims of Virus Shield at least two of the claims made – low battery consumption and no ads – are true. But these claims are useless especially when you’re paying for it.
According to Appbrain, the software sailed past 10,000 downloads, putting its take at close to $US 40,000 for nothing at all. As Android Police says: “this is such a brazen and expensive fake that we felt the need to give it some special attention. It’s somewhat disheartening that an app so obviously fake could rise to the top, especially considering that it’s paid, and possibly hundreds or thousands of people have been defrauded already.”
Google play has to do something for such fake apps else people will may be defraud by many or who knows are defrauding now – a question which should be taken as seriously.

View full post on Who Got Hacked – Latest Hacking News and Security Updates

Google denies accessing journalist’s email to spy on leakers

Google was accused of spying by TechCrunch founder Michael Arrington, a journalist, who accused the technology giant of breaking into his email account to know who was sending Arrington the emails of Google’s internal affairs.
 However Google denies the charge calling it “serious and unimaginable”. In a statement to Recode on Tuesday, Google General Counsel Kent Walker.said that although the terms of Service allowed the company to do so yet they had done no such spying on user. Arrington said that he had an accomplice inside Google who used to send him emails about what is happening inside Google. 
He was fired lately after shown an email mirror of Arrington’s account showing the former’s correspondence with Arrington. This could not have been possible without Google’s breaking into my account, said Arrington.

View full post on Who Got Hacked – Latest Hacking News and Security Updates

Google Public DNS Intercepted by ISPs in Turkey 

Google’s Domain Name Service DNS has been intercepted by majority of Internet Service Providers ISPs in Turkey. Google’s Public DNS resolution service lets people use the search giant’s DNS servers as alternative to other DNS providers, often ISPs, for security and freedom from censorship. 
 According to Google’s Steven Carstensen, Turkish ISPs have set up servers that are essentially masquerading as Google’s DNS service. 
 “We have received several credible reports and confirmed with our own research that Google’s Domain Name System (DNS) service has been intercepted by most Turkish ISPs (Internet Service Providers),” Carstensen wrote in a blog post Saturday afternoon. “Google operates DNS servers because we believe that you should be able to quickly and securely make your way to whatever host you’re looking for, be it YouTube, Twitter, or any other,” Carstensen wrote. “But imagine if someone had changed out your phone book with another one, which looks pretty much the same as before, except that the listings for a few people showed the wrong phone number.” That’s exactly what the Turkish ISPs have done. 
 Turkish government has blocked both Twitter and YouTube a few days before. Sources claim that the government has blocked YouTube to prevent the spread of videos that allegedly feature the Turkish defense Minster and Intelligence chief talking about possible military invasion of Syria to protect the tomb of Suleiman Shah, the grandfather of the founder of the Ottoman Dynasty.
 Meanwhile, Defense Ministry Spokesman, Davutoglu told AFP on Wednesday “Turkey is ready to take any legitimate step under international law if its national security, including the area where the tomb of Suleyman Shah is situated, is threatened,” Davutoglu told AFP on Wednesday.

View full post on Who Got Hacked – Latest Hacking News and Security Updates

‘CoinKrypt’ Malware Uses Google Android Phones to Mine Virtual Currency

Hackers are no longer behind your data. Now they are interested in your phone. Yes this is increasing becoming global phenomena where hackers are developing malware to damage your phone and earn virtual currency known as bitcoin. Phone Mining is a terms use to describe the way in which hackers can use your phone to generate virtual currency.
 These malware are embedded in different android apps and are usually uploaded on Google store. A user download an app thinking of it to be game, or whatever he wants. Yet in truth it is a malware that will install it self on ur device and then use it to mine digital money. Just recently, researchers at Trend Micro noted the appearance of Google Android malware as repacked copies of popular apps such as Football Manager Handheld and TuneInvRadio that is involved in mining digital money. 
The apps were injected with the CPU mining code from a legitimate Android cryptocurrency mining app that is based on the well- known cpuminer software. Recently CoinKrypt malware is being spread across the online forum which is believed to the most effective mining malware. 
This fairly simple software has the ability to mine targets as Litecoin, Dogecoin and Casinocoin while ignoring Bitcoin because of the relative difficulty in mining it.

 Lookout principal security researcher Marc Rogers told Security Week that software can not only use your packet data but it can also damage or burn your hardware. As it sets the infected phone to mine for currency by downloading and generating Gigabytes of hashes. 
Which will heat up your phone incredibly and will damage your phone’s battery and power supply. “Users with phones and tablets that are suddenly charging slowly, running hot, or quickly running out of batteries may want to consider if they have been exposed to this or similar threats,” blogged Trend Micro Mobile Threats Analyst Veo Zhang. “Also, just because an app has been downloaded from an app store – even Google Play – does not mean it is safe”.

View full post on Who Got Hacked – Latest Hacking News and Security Updates

Android bug that crashed Google Play can brick devices too

“A BUG THAT CRASHED GOOGLE MARKET CAN ALSO BRICK ANDROID DEVICES”. Few days ago we reported, there was a wide spread hue and cry over Google Playstore crash
Actually, it was a result of the quasi-DDoS attack mounted on the PlayStore by Ibrahim Balic, a London based security researcher. He wanted to prove his concept before Google that by setting an application’s name parameter (app-name) greater than 387,000 characters, can successfully crash the Google Play Store. 
He tested this against Google Bouncer, which render the Play Store inaccessible to hundreds of developers around the globe. Quite interestingly however, the same “Balic’s exploit” can also crash Android devices using Android 4 and onwards. 
As highlighted by Trend Micro, a malformed .apk file, called “Memory Corruption Bug”, can force an Android device to crash. It can crash WindowsManager, PackageManager and ActivityManager.Therefore it can be a valuable tool for cyber criminals. 
Trend Micro security analyst, Zhang suggests that if properly written, this bug apk file can launch an Android devices into “infinite loop on reboots.” Zhang believes that it is possible to bypass transaction buffer and upload such malicious file on Play Store in ADB (Android Debug Bridge) mode, which is widely used by the third-party applications developers nowadays. 
Zhang further said that this valunerability can be exploited by cyber criminals, who use it to crash and brick Android devices as this bug can set android devices on infinite loop of reboot which can erase all the data on devices.

View full post on Who Got Hacked – Latest Hacking News and Security Updates

iPhone 6 with solar charging, Red Google Nexus 5 photo, HTC M8 design & more – Pocketnow Daily

Stories: – Microsoft announces OneDrive, its SkyDrive replacement – This red Nexus 5 is actually…

________________________ – – –

Google Glass malware developed by researchers

Forbes reports that two grad students at California Polytechnic San Luis Obispo recently developed POC spyware for Google Glass ).
Malware has been desighned by Mike Lady 22 year old researcher along with  Kim Paterson 24 year old software professional , malware is able to take and upload photo every 10 seconds, without knowing a user.
Paterson said:- “The scary thing for us is that while it’s a policy that you can’t turn off the display when you use the camera, there’s nothing that actually prevents you from doing it,As someone who owns Glass and wants to install more apps, I’d feel a lot better if it were simply impossible to do that. Policies don’t really protect us.”

View full post on Who Got Hacked – Latest Hacking News and Security Updates

Page 2 of 19«12345»10...Last »

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?

Find Out More, Click Here!