Nextbit, a mobile technology company founded by former Google executives Tom Moss and Mike Chan, today announced that Scott Croyle has joined as Vice President of Design and Product. Croyle, who was most recently Senior Vice President of Design and User Experience at HTC, will also join the company’s board of directors alongside Rich Wong from Accel Partners and Rich Miner from Google Ventures.
A software bug disrupted some Google searches for roughly eight hours early Tuesday, displaying multiple images of what appeared to be a car crash in Russia and sparking speculation that Google had been hacked.
The image displayed in response to many searches showed a badly mangled car near a sign that says "stop" in Russian. It wasn't clear if the image had been altered. It didn't appear on every search.
Google today released a 64-bit stable version of its Chrome browser for Windows systems. The 64-bit support has been in testing since June, and as of Chrome version 37 it has made it to the mainstream version.
The 64-bit version offers three main advantages and one possible drawback. The browser's advantages are speed, security, and stability. Google claims that certain media and graphics workloads in particular are faster with 64-bit. It offers the example of VP9 video decoding—used for some YouTube high-definition streams—being 15 percent quicker compared to 32-bit.
The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept.
US security researchers have found out how to hack Gmail with up to 92 percent success across the Android, Windows and iOS operating systems due to a vulnerability.
The flaw was uncovered by experts at the University of California Riverside Bourns College of Engineering and the University of Michigan, who identified a weakness believed to exist in the app on all major operating systems. They said that the vulnerability could allow attackers to steal users' sensitive data.