Google and Samsung's new file sharing service may become a target for hackers.
Google's Quick Share is a feature-rich utility for sharing data between Android, Windows, and Chrome OS devices. It uses a wide range of communication protocols, including Bluetooth, Wi-Fi, Wi-Fi Direct, WebRTC, and...
The court decision threatens radical consequences.
The US Department of Justice won an important victory in an antitrust case against Google, recognizing the company as a monopolist in the online search market. Judge Amit Mehta, who made the decision, must now determine what measures will be...
The company has notified customers of its obligation to provide data upon request.
Google sent an important notification to its users, which informs about the possible transfer of confidential information to US government agencies for legal requirements. The message caused a resonance among...
Cybercriminals have found a new way to deceive even the most cautious users.
Menlo Security discovered a new phishing campaign that uses Google + to bypass security systems and deceive users, forcing victims to click on fake links created to steal confidential information.
The attack is a...
Effingo delivers unprecedented data transfer speeds, changing the rules of the game in information management.
Google has revealed the technical details of its internal data transfer tool called Effingo, which moves an average of 1.2 exabytes of information daily.
At the SIGCOMM 2024...
The verdict entails a change in the structure of the Internet and user experience.
A US Federal District Court ruled that Google illegally maintained a monopoly on the online search market. A court decision can change not only the company's business model, but also the structure of the Internet...
Automatic installation of privileges puts project security at risk.
Cybersecurity researchers have discovered a privilege escalation vulnerability in the Google Cloud Platform's Cloud Functions service. This vulnerability, called ConfusedFunction, can allow an attacker to gain unauthorized...
Publishers are attacking shadow libraries to protect their rights and fight AI scraping.
Link-Busters has become the first anti-piracy organization to report more than a billion copyright-infringing URLs to Google. The most frequently deleted domains are Anna's Archive and Z-Library, and the...
The Dobra Corporation is tightening the criteria for indexing content.
10 years ago, the launch of a new WordPress blog was accompanied by almost instant indexing of content in Google. The search engine aimed to make all the information available to users as soon as possible, which was also...
The company offers users a choice and will continue to develop Privacy Sandbox.
After much discussion and consideration, Google decided to retain support for third-party cookies in the Chrome browser. It turned out that all the fuss of recent years was not in vain — the complaints of the...
Google Ads is used to run a sophisticated campaign.
In recent weeks, Threat Down experts have seen a surge in malicious ads on Google aimed at IT professionals. The campaign aims to gain access to victims systems and steal confidential data.
Research has shown the use of a single...
And there's nothing you can do about it.
Amid investigations by the US Department of Justice and the European Digital Markets Act (DMA), there have been reports that Google is using the Chrome browser to gain advantages over competitors. Chrome collects data about device performance and...
The company explained for which errors you can now get $151,515.
Google announced an increase in payments for found vulnerabilities in its systems and applications. Since the company's systems have become more secure, and now it takes much longer to detect errors, Google decided to increase...
Google One loses valuable features, but the price remains the same.
From the end of July, Google will start providing reports on personal data leaks in the dark Web to all Google account holders, which was previously available only to Google One subscribers. Now any user can use the service to...
Journalists and politicians receive enhanced protection at no additional cost.
Today, Google announced that high-risk users can now officially use Passkey technology to participate in its proprietary Advanced Protection Program (APP). Previously, physical security keys were required to...
Google has introduced the kvmCTF initiative, in which security researchers can receive a monetary reward for identifying vulnerabilities in the KVM hypervisor (Kernel-based Virtual Machine). Google's interest in KVM is due to the use of this hypervisor in the Google Cloud service, as well as in...
The court ordered Google, Cloudflare and Cisco to block access to pirated sports sites.
A French court has ruled that Google, Cloudflare and Cisco must interfere with their DNS resolvers to prevent circumvention of blockages targeting about 117 pirated sports sites. This is another step in the...
Планы Google отказаться от сторонних отслеживающих файлов cookie в своем веб-браузере Chrome с помощью Privacy Sandbox столкнулись с новыми проблемами после того, как австрийская некоммерческая организация noyb (none of your business) заявила, что эта функция по-прежнему может использоваться для...
The European consumer protection organization noyb is filing a complaint against Google for "dark patterns".
The European consumer protection organization noyb has filed a complaint against Google, accusing the company of misleading users about the new "Privacy Sandbox" feature in the Chrome...
Google предупредила, что ошибка безопасности, влияющая на прошивку Pixel, была широко использована как "нулевой день".
Уязвимость высокой степени серьезности, помеченная как CVE-2024-32896, была описана как проблема с повышением привилегий в прошивке Pixel.
Компания не поделилась какими-либо...