Tagged With / 'google'

April 5, 2013

Articles Free Articles News reviews admin Comments Off

Overview of mobile platforms (March 2013)

This article describes hardware and software division on the mobile platform market. “Mobile platform” means mass handheld devices with an autonomous power source designated for solving a large variety of general tasks: entertainment, communications and business. This article does not examine personal desktop computers and their portable versions (notebooks/netbooks/etc.)

Read more

December 8, 2011

Google Code Playground XSS vulnerability

Two security researchers have identified an XSS in Google Code. Proof Of Concept: Just go to http://code.google.com/apis/ajax/playground/ and then click on edit HTML after that remove all the codes and type this script : “<img src=”<img src=search”/onerror=alert(“XSS”)//”>” and click on DEBUG CODE, and then first it will show you “Sample must have <head> element” click […]

Read more

November 27, 2011

HTTPS encryption increased for Gmail and Google+

Google already offers HTTPS as default for Gmail and encrypted search. Google has now moved on and is now enabling “forward secrecy” by default. Forward secrecy (or PFS) ensures that a session key cannot be compromised if a long term private key is compromised in the future. What this means is, forward secrecy doesn’t allow […]

Read more

November 4, 2011

Android 4.0 Ice Cream Sandwich security enhanced

The Android 4.0 operating system, otherwise known as “Ice Cream Sandwich”, has been in the security news recently. Android 4.0 is possibly Google’s most secure operating system, to date, so to hear that Android 4.0 has added address layout randomization (ASLR) is good news for enteprise and mobile security for end-users (consumers included ) in […]

Read more

November 4, 2011

How to block ads in Google search and Gmail

Google is about to give Googlers the control over the ads that you see – what Google calls ‘ads personalization’. This is great news indeed. For those of you who wonder why only certain ads appear when you search, this is down to ‘ads personalization’. When you search for something in Google that page that […]

Read more

October 31, 2011

Hacking Data

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Secure Log Server With Rsyslog By Leonardo Neves Bernardo This article will discuss how to […]

Read more

October 27, 2011

Google Chrome 15 fixes 27 security flaws

Google’s bug bounties is certainly working. Security researchers have identified over 27 flaws in Google Chrome – one researcher Sergey Glazunov found a number of flaws earning him a respectable $12.174 for five high impact flaws in what Google calls ‘cross-origin-policy violations’. Good work Sergey! Other high impact flaws fixed in Chrome 15 include: CVE-2011-2845: […]

Read more

October 20, 2011

Google browser encryption removing SEO keyword data

If you work in SEO, you might not want to read this. Google announced on the 18th October that it would automatically enable encrypted browsing for searchers, but only for those that signed into their Google accounts. Protecting the privacy of users is Google’s aim here. It means that Google isn’t going to relay any […]

Read more

September 29, 2011

Google Chrome AutoFill privacy and security issues

Google Chrome users who read julianevansblog.com, have voiced concerns on a number of occasions recently about the AutoFill feature. Let’s take a look at this feature (which has been around for over a year now) and answer some of the privacy and security issues as well as show you how to turn off the AutoFill […]

Read more

September 28, 2011

Hack Apple

Hack Apple 10/11

In Brief By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Hacking Tools on iOS By Alexandre Lacan One day I was asked if the iPhone is a good phone. […]

Read more

July 2, 2011


Review of Web Application Obfuscation

Review of Web Application Obfuscation By Aby Rao, MS, CISSP, Security+, ITIL-F, ISO/IEC 20000, Project+ Principal, Verve Security (http://www.vervesecurity.com) www.syngress.com   Obfuscation – the act or an instance of making something obscure, dark, or difficult to understand It’s quite uncommon for a technical book to have such a “heavy” word in its title. Please don’t […]

Read more

November 1, 2010

Search Engine Security and Privacy – Part II

It is always surprising to see how much information is available to anyone with an Internet connection and little tenacity. Author: REBECCA WYNN Source: Hakin9 11/2010 https://hakin9.org What you will learn… Search Engine Wars update How to protect your identity and privacy What you should know… Search engine basics Since Part 1 was published in the July 2010 […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa