Skip to main content

Google

Cyanogen and veterans from Google, Amazon and HTC are building 'something really cool'

posted onAugust 28, 2014
by l33tdawg

Nextbit, a mobile technology company founded by former Google executives Tom Moss and Mike Chan, today announced that Scott Croyle has joined as Vice President of Design and Product. Croyle, who was most recently Senior Vice President of Design and User Experience at HTC, will also join the company’s board of directors alongside Rich Wong from Accel Partners and Rich Miner from Google Ventures.

Google Bug in Searches Spurs Talk of Hacking

posted onAugust 27, 2014
by l33tdawg

A software bug disrupted some Google searches for roughly eight hours early Tuesday, displaying multiple images of what appeared to be a car crash in Russia and sparking speculation that Google had been hacked.

The image displayed in response to many searches showed a badly mangled car near a sign that says "stop" in Russian. It wasn't clear if the image had been altered. It didn't appear on every search.

Chrome 64-bit browser finally available as a stable version

posted onAugust 27, 2014
by l33tdawg

Google today released a 64-bit stable version of its Chrome browser for Windows systems. The 64-bit support has been in testing since June, and as of Chrome version 37 it has made it to the mainstream version.

The 64-bit version offers three main advantages and one possible drawback. The browser's advantages are speed, security, and stability. Google claims that certain media and graphics workloads in particular are faster with 64-bit. It offers the example of VP9 video decoding—used for some YouTube high-definition streams—being 15 percent quicker compared to 32-bit.

How the NSA Built Its Own Secret Google

posted onAugust 26, 2014
by l33tdawg

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept.

Cyber security experts find 92 percent successful Gmail hack

posted onAugust 26, 2014
by l33tdawg

US security researchers have found out how to hack Gmail with up to 92 percent success across the Android, Windows and iOS operating systems due to a vulnerability.

The flaw was uncovered by experts at the University of California Riverside Bourns College of Engineering and the University of Michigan, who identified a weakness believed to exist in the app on all major operating systems. They said that the vulnerability could allow attackers to steal users' sensitive data.

Google gets patent to make Glass look like ordinary specs

posted onAugust 22, 2014
by l33tdawg

Google appears to be redesigning Glass to make the wearable computer look less nerdy and more like ordinary eyeglasses.

With the company's computerized eyeglasses, users can take photos and video, view maps and weather reports and read news stories with a tiny see-through display screen that sits above the user's right eye.

New Google Chrome 36 Stable Fixes 12 Vulnerabilities

posted onAugust 13, 2014
by l33tdawg

A total of 12 vulnerabilities have been repaired in this release, as always, some of them being discovered by external security researchers, who were also rewarded for their efforts through Google’s bug bounty program.

For a use-after-free security flaw (CVE-2014-3165) in web sockets, Google paid $2,000 / €1,500 to researcher Collin Payne; additional information about this flaw is not available at the moment.

School system CIOs are sold on Chromebooks

posted onAugust 12, 2014
by l33tdawg

avid Andrade, the CIO of Bridgeport Public Schools in Connecticut, has deployed 11,000 Chromebooks over the past year and plans to add another 5,000 in the next 12 months. It's a major deployment, but not unusual.

Other school systems are doing much the same thing. The Cherry Creeks School District in Greenwood Village, Co. deployed 18,000 last year, and Boston recently announced a deployment of 10,000 Chromebooks.

How hackers used Google in stealing corporate data

posted onAugust 8, 2014
by l33tdawg

A group of innovative hackers used free services from Google and an Internet infrastructure company to disguise data stolen from corporate and government computers, a security firm reported.

FireEye discovered the campaign, dubbed Poisoned Hurricane, in March while analyzing traffic originating from systems infected with a remote access tool (RAT) the firm called Kaba, a variant of the better known PlugX.