Facebook iconTwitter icon
B2B-Network:
Inside Story
Google discloses bug vulnerability details
Thumb 2

Google has once again proven its tough stance against vulnerabilities after its 90-day Project Zero had a strict disclosure deadline. Based on the latest bug report that has been filed by the Project Zero staff at Google, it was found that the bug first appeared in March 2016 before getting fixed in June 2016. 

The bug, which is called CVE 2017 0037, had wormed its way into Internet Explorer and allowed hackers to impose arbitrary code on target devices whenever users visit an infected website. This bug affected Windows 7, 8, and 10. Researchers in Microsoft have published an...

» Read more
Inside Story
A step towards automating encryption
Thumb machine learning header

Google has clearly indicated that AI can create its cryptographic standard – which is indeed a critical step towards automating encryption. In a paper released by the Google team, it indicates that the three neutral networks developed – Alice, Eve, and Bob – were able to carry out the individual tasks that were assigned to them.

For instance, Eve (the hacker) was able to crack the message sent to Bob for decrypting by Alice, the message sender. The hacker was asked to crack the message without using any key. Here, all the three networks were asked to make up the message as...

» Read more
Google is increasing its efforts to provide security to its users
Thumb untitled 2

Google Chrome is a web browser made by Google. It was first released for the Windows operating system in September, 2008. As of January 2015, statistics from web traffic monitoring agencies estimate that it has about 51 percent of the total browser usage share, making it one of the most popular in the world. This indicates a significant increase in usage numbers over the past 6 years. However, with growth comes greater exposure to hacks and related security attacks.

 

So what are the security features on Google Chrome? Chrome comes with numerous security features, starting with...

» Read more
Google Drive
Itsecurity placeholder

Google Drive for Work users to benefit from tighter document security controls

( Source: www.computerweekly.com )
» Read more
Theft by Pisher using counterfeit Google Drive page
Thumb untitled 3

The Internet offers the user more comfort, including cloud services include, with those stored in the same files easily and can be exchanged. Cyber criminals use this in their own way, to gain access to the personal data of internet users. A new scam is an imitation of the famous Google Home Drive. Users give this a fake website their credentials that are intercepted after addition to their personal information from the scammers.

This new trick of cyber criminals finds its beginning in a non-hazardous appearing email. In this, the receiver is made to a file in PDF format, which can be...

» Read more
Loader