Tag: google

  • VB2017 paper: VirusTotal tips, tricks and myths

    In a surprise announcement , Google ‘s parent company Alphabet has introduced Chronicle , a threat intelligence offering in which Google -owned VirusTotal will play an important role. While it is unclear at the moment what exactly Chronicle will do, the use of VirusTotal ‘s data is certainly interesting, given how important it is as…

  • VB2017 paper: VirusTotal tips, tricks and myths

    In a surprise announcement , Google ‘s parent company Alphabet has introduced Chronicle , a threat intelligence offering in which Google -owned VirusTotal will play an important role. While it is unclear at the moment what exactly Chronicle will do, the use of VirusTotal ‘s data is certainly interesting, given how important it is as…

  • Tizi Android malware highlights the importance of security patches for high-risk users

    A well-known security researcher once said : “if you purposely choose Android you are either Poor, Cheap, or really hate Apple.” Android has a bad reputation in security circles, though these days that is less because of a lack of effort on Google ‘s part and more because of the prevalence of many older devices…

  • Tizi Android malware highlights the importance of security patches for high-risk users

    A well-known security researcher once said : “if you purposely choose Android you are either Poor, Cheap, or really hate Apple.” Android has a bad reputation in security circles, though these days that is less because of a lack of effort on Google ‘s part and more because of the prevalence of many older devices…

  • WireX DDoS botnet takedown shows the best side of the security industry

    It is easy to be cynical about the security industry and its tendency to make ever bigger mountains out of molehills, but behind a thin layer of marketing, there are a great many people who really care about making the world a more secure place. We have seen many examples of researchers from competitor companies…

  • WireX DDoS botnet takedown shows the best side of the security industry

    It is easy to be cynical about the security industry and its tendency to make ever bigger mountains out of molehills, but behind a thin layer of marketing, there are a great many people who really care about making the world a more secure place. We have seen many examples of researchers from competitor companies…

  • The SHA-1 hashing algorithm has been ‘shattered’

    Researchers from Google and CWI Amsterdam have created the first publicly known SHA-1 collision. SHA-1 is a hashing algorithm: it turns data of arbitrary size (such as a string of text, or a file) into a fixed-length string, with a number of cryptographic properties . Hash functions are ubiquitous in IT in general and security in…

  • The SHA-1 hashing algorithm has been ‘shattered’

    Researchers from Google and CWI Amsterdam have created the first publicly known SHA-1 collision. SHA-1 is a hashing algorithm: it turns data of arbitrary size (such as a string of text, or a file) into a fixed-length string, with a number of cryptographic properties . Hash functions are ubiquitous in IT in general and security in…

  • VB2015 video: Making a dent in Russian mobile banking phishing

    Sebastian Porst explains what Google has done to protect users from phishing apps targeting Russian banks. In the last few years, mobile malware has evolved from a mostly theoretical threat to a very serious one that affects many users. Indeed, several talks at VB2015 dealt with various aspects of mobile security in general and that…

  • Google ‘suspends’ CNNIC from Chrome’s certificate store

    Chinese certificate authority told to re-apply. When a web client, such as a browser, attempts to make an HTTPS connection, it needs to know that no man-in-the-middle attack is taking place. The web server therefore proves its authenticity by presenting the client with a certificate. This certificate is cryptographically signed by a certificate authority (CA),…