Blog Posts Tagged with "Gmail"

69dafe8b58066478aea48f3d0f384820

State Sponsored IE Vulnerability and a Four Line MySQL Exploit

June 21, 2012 Added by:Headlines

Of the two latest Microsoft IE vulnerabilities, the first seems the most interesting. Rumored to be “State-Sponsored”, the vulnerability focuses on Gmail, MS Office and Internet Explorer. And as yet is still an active Zero Day exploit. Security software company Rapid 7 explains the vulnerability as follows...

Comments  (0)

296634767383f056e82787fcb3b94864

Google's Worst Security Idea Ever

June 06, 2012 Added by:Jeffrey Carr

Google announced that it will notify a subset of its Gmail customers if they're the victim of a State-sponsored attack. Google's advice is FUD-inducing for people who aren't targets and insufficient for those who are. I have to wonder what Google was thinking when it created this awful program...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Malware Targeting Facebook, Gmail and Yahoo Users

May 16, 2012 Added by:Headlines

"We've recently discovered a series of attacks being carried out by a P2P variant of the Zeus platform against some of the internet’s leading online services... The attacks are targeting users of Facebook, Google Mail, Hotmail and Yahoo – offering rebates and new security measures..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Fake YouTube Site Targets Activists with Malware

March 17, 2012 Added by:Electronic Frontier Foundation

The fake YouTube page attacks users in two ways: it requires you to enter your YouTube login credentials in order to leave comments, and it installs malware disguised as an Adobe Flash Player update. To see if you have been infected, look for the following files...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Spear-Phishing Operation Targets Senior US Officials

August 16, 2011 Added by:Headlines

"Victims get a message from an address of a close associate or a collaborating organization/agency, which is spoofed. The message is crafted to look like a subscription form offering to enter Gmail credentials to activate it..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

What To Do If Your Gmail Account Has Been Hacked

July 21, 2011 Added by:Robert Siciliano

Once Kate went through this process, she regained control of her account within minutes. But the criminal had deleted every single email, leaving her with nothing. He’s probably going through those messages now, searching for any useful personal information...

Comments  (6)

16443e0c6f6e4a400fd0164b3c406170

When a "Phish" is Really Fishy

June 30, 2011 Added by:Christopher Burgess

Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity. Recently, one slipped through my filters. I've taken the liberty to identify each item within this phish, which seems fishy...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Security Awareness and Why Things Aren't Improving

June 03, 2011 Added by:Don Eijndhoven

While the use of internet technology has grown exponentially over the last decade, users have not grown much wiser in terms of security. Largely this is because the populace simply does not see the danger in having their online identities compromised; its too abstract a notion...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Cybersecurity and the U.S. House of Nonsense

June 02, 2011 Added by:J. Oquendo

When it comes to mission critical, sensitive information, why are government officials using anything outside of vetted networks, connections, and / or software. This is not only puzzling but borders on outright stupidity and negligence...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

China Denies Orchestrating Gmail Hijacking Campaign

June 02, 2011 Added by:Headlines

"We are obviously very concerned about Google's announcement regarding a campaign that the company believes originated in China to collect the passwords of Google email account holders... These allegations are very serious... We're looking into them," said Secretary of State Hillary Clinton...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cookiejacking Exploit Threatens Facebook Accounts

May 26, 2011 Added by:Headlines

"The attack exploits a vulnerability in the IE security zones feature... By embedding a special iframe tag in a malicious website, an attacker can circumvent this cross zone interaction and cause the browser to expose cookies stored on the victim's computer..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Says Microsoft MHTML Bug Exploited by China

March 21, 2011 Added by:Headlines

Google has blamed the Chinese government for problems accessing Gmail. Google "noticed some highly targeted and apparently politically motivated attacks against our users. We believe activists may have been a specific target. We’ve also seen attacks against users of another popular social site..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Five Communications Channels Feds May Soon Wiretap

March 07, 2011 Added by:Headlines

A central issue is the inability of new communications platforms to collect and store the kind of data law enforcement needs to pursue indictments, and current laws do not require the service providers to store the information. That may all change soon...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Plays Lost and Found With Gmail Accounts

March 02, 2011 Added by:Headlines

What is quite interesting about the event is the revelation from Google that the data for Gmail is backed up on tapes. Yes, Google, which maintains some of the largest network storage systems in the world, backs up data on relatively antiquated tapes...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Gmail Data Vanishes Into the Cloud

February 28, 2011 Added by:Headlines

More than a few Gmail users logged into their accounts this weekend to find that all of their email, chats, photos, and documents were no longer available. Many of the affected users were simply greeted with the Gmail "welcome" message as if their accounts were newly created...

Comments  (2)

11146d62a6c31fb9fac8ac8ac991e08d

There is No Incentive to End Security Apathy

October 11, 2010 Added by:Andy Willingham

I’m all for protecting peoples accounts no matter what type they are. After all I am in Information Security for a reason. The problem is that protecting accounts requires the user to want to protect it. We can’t continue to hold their hands and fix all of their problems for them...

Comments  (1)


Most Liked