Articles tagged "Google"

Found 81 articles

Google has rolled out new location privacy features in the Android 17 Beta 3, allowing users better control over their precise location data. A key addition is the location button, which enables one-time access to location information for tasks like finding nearby places or tagging content, without the need for continuous tracking. This update aims to minimize data collection practices and enhance user privacy while providing developers with the tools necessary to design safer applications. This change is particularly relevant as location data can often be sensitive, and users are increasingly concerned about how their information is used. By implementing these features, Google is responding to user demands for greater transparency and control over personal data.

Impact: Android 17 Beta 3
Remediation: N/A
Read Original
Actively Exploited

The latest Malware newsletter from Security Affairs reports on several significant cybersecurity threats. One notable incident involves new malware specifically targeting users of Cobra DocGuard software, potentially compromising sensitive data. Additionally, Iranian cyber actors have been using Telegram as a command and control channel to distribute malware to predetermined targets, raising concerns about state-sponsored cyber activities. The newsletter also discusses the Trivy supply chain attack, which has now expanded to include compromised Docker images, putting many containerized applications at risk. Lastly, a new malware called VoidStealer has been identified, which manipulates Chrome debugging tools to extract user information. These developments highlight ongoing vulnerabilities in software and the tactics employed by cybercriminals and state actors alike.

Impact: Cobra DocGuard software, Docker images, Google Chrome
Remediation: Users of affected software should update to the latest versions and apply security patches as they become available. It's also recommended to monitor network traffic for unusual activity and to use security tools that can detect and block malware.
Read Original

Recent reports indicate that cybercriminals are increasingly using cloud phones, which are virtualized Android devices hosted on remote servers, to carry out financial fraud schemes. These devices provide attackers with anonymity and the capability to manipulate phone numbers, making it easier for them to bypass traditional security measures. As a result, victims can include individuals and businesses alike, potentially leading to significant financial losses. Security experts warn that the rise of these technologies poses a growing risk to online transactions and personal data. Companies and users need to be vigilant and adopt more stringent security practices to mitigate these threats.

Impact: Cloud phones, virtualized Android devices
Remediation: Users and companies should implement multi-factor authentication, monitor for unusual account activity, and educate staff about potential scams involving cloud phone technology.
Read Original

Google has accelerated its timeline for implementing post-quantum encryption, moving the target date from 2035 to 2029. This decision reflects the company's growing concern over the potential risks posed by quantum computing to their systems and data security. As quantum technology advances, traditional encryption methods may become vulnerable, prompting tech companies like Google to prioritize stronger security measures. By adopting post-quantum encryption sooner, Google aims to better protect its infrastructure and user data against future threats. This shift is significant not just for Google, but for other tech firms that rely on similar encryption methods.

Impact: Google systems and devices
Remediation: N/A
Read Original

Researchers at Expel have raised concerns about malicious Chrome extensions that are targeting users' conversations with AI tools. These extensions, often disguised as useful add-ons, can secretly collect and transmit sensitive information, including chat history and personal data. Users who install these extensions unknowingly expose their private interactions to potential attackers. This incident is particularly concerning as AI technology becomes more integrated into daily tasks, increasing the risk of data breaches. Users are advised to be cautious about the extensions they install and to regularly review their browser settings for any unauthorized additions.

Impact: Google Chrome browser extensions
Remediation: Users should avoid installing unverified extensions and regularly check their browser for suspicious add-ons. Removing any dubious extensions is recommended.
Read Original

VoidStealer is a new type of information-stealing malware that has been discovered to exploit a flaw in Chrome's Application-Bound Encryption (ABE). This malware uses a clever method to bypass security measures and access the master key needed to decrypt sensitive data stored in the Chrome browser. As a result, users' personal information, including passwords and credit card details, could be at risk. This development is concerning for anyone using Chrome, as it highlights vulnerabilities that attackers can exploit to gain unauthorized access to private data. Users should remain vigilant and consider enhancing their security measures to protect against such threats.

Impact: Google Chrome
Remediation: Users should ensure their Chrome browser is updated to the latest version and consider using additional security tools to monitor for suspicious activity.
Read Original

Google has decided to reverse its plan to require Android developers to link their apps to verified developer accounts, a move that had sparked significant backlash from users. The original requirement, which was set to take effect in September 2026, involved a $25 fee and the submission of personal identification for verification. Many users expressed concerns over privacy and accessibility, arguing that the new rule could limit the diversity of apps available on the platform. By stepping back from this policy, Google aims to maintain a more open app ecosystem while addressing user concerns about potential barriers to entry for developers. This decision reflects the ongoing tension between security measures and user freedom in the app development landscape.

Impact: Android apps on certified devices
Remediation: N/A
Read Original

A malicious Chrome extension called ShieldGuard was discovered to be a crypto scam masquerading as a security tool. This extension primarily targeted users looking to protect their cryptocurrency wallets but instead siphoned off sensitive wallet information and drained user data. Researchers found that once installed, the extension would exploit its permissions to access and transfer funds from users' crypto wallets. This incident affects anyone who installed the ShieldGuard extension, highlighting the ongoing risks of using unverified browser extensions in the cryptocurrency space. Users are urged to be cautious and only download extensions from reputable sources to safeguard their assets.

Impact: ShieldGuard Chrome extension
Remediation: Users should uninstall the ShieldGuard extension immediately and monitor their crypto wallets for unauthorized transactions.
Read Original
Actively Exploited

Researchers have discovered a serious vulnerability in Android that allows attackers to hijack mobile payment applications using a technique called LSPosed-based runtime manipulation. This attack can bypass security measures such as SIM binding, which is intended to protect users' financial transactions. As a result, anyone using affected payment apps could be at risk of fraud and unauthorized transactions. This incident highlights the ongoing challenges in mobile security, especially for users who rely on their devices for financial activities. Users should be cautious and consider reviewing their app security settings until further protections are implemented.

Impact: Android mobile payment applications, particularly those using LSPosed framework
Remediation: Users should monitor their payment app security settings and stay updated with any security patches from app developers.
Read Original

A recent report from Google reveals a significant shift in the ransomware landscape, indicating that attackers are increasingly focusing on data extortion rather than traditional ransom demands. This change complicates the understanding of the full scope of cybercrime and its impact on businesses and individuals. Researchers found that this evolution allows cybercriminals to extract sensitive information from victims and threaten to release it publicly if their demands are not met. This trend raises serious concerns for organizations, as it puts their data security at risk and can lead to severe reputational damage. Companies need to be more vigilant about securing their data and preparing for potential breaches, as the consequences of data extortion can be devastating.

Impact: N/A
Remediation: Organizations should enhance data security measures, implement robust backup solutions, and prepare incident response plans to handle potential data extortion threats.
Read Original

In 2025, Google awarded over $17 million to 747 security researchers through its Vulnerability Reward Program (VRP) for reporting various security vulnerabilities. This initiative not only incentivizes researchers to identify and report bugs but also strengthens the overall security of Google's products and services. By paying for these reports, Google is actively encouraging contributions from the security community, which helps mitigate potential threats before they can be exploited. This program is essential for maintaining user trust and safeguarding sensitive information across the company's platforms. The financial commitment reflects the increasing importance of cybersecurity in the tech industry.

Impact: Google products and services
Remediation: N/A
Read Original

A significant hardware vulnerability has been identified that affects approximately 25% of Android phones, particularly those in the budget category. This flaw allows attackers to potentially steal sensitive information, including cryptocurrency wallet seed phrases, in under a minute. Users of affected devices should be concerned as this could lead to serious financial losses and privacy breaches. The issue emphasizes the need for manufacturers to improve security measures in their devices and for users to be vigilant about their phone's security. It's crucial for owners of budget Android phones to check if their devices are impacted and take necessary precautions.

Impact: Budget Android phones from various manufacturers.
Remediation: Users should check for updates from their device manufacturer and apply any security patches as they become available. Additionally, users can enhance their security by changing sensitive information, such as wallet seed phrases, and being cautious about app installations.
Read Original

Two Google Chrome extensions have been compromised after a transfer of ownership, allowing attackers to inject malicious code and steal sensitive user data. The extensions, originally developed by a user identified as 'akshayanuonline@gmail.com', are QuickLens and another unnamed extension. This incident raises significant concerns as it exposes users who have installed these extensions to potential malware and data breaches. Users of these extensions should be cautious and consider removing them to protect their information. This situation serves as a reminder of the risks associated with third-party software and the importance of monitoring the permissions and developers of browser extensions.

Impact: QuickLens Chrome extension and another unnamed extension associated with 'akshayanuonline@gmail.com'.
Remediation: Users should uninstall the affected extensions immediately and monitor their accounts for any suspicious activity.
Read Original

Google has reported a significant increase in zero-day attacks targeting enterprise software, with nearly a quarter of these incidents aimed at security and networking appliances in 2025. This trend indicates that attackers are increasingly focusing on vulnerabilities within critical infrastructure components used by businesses. The implications are serious, as these vulnerabilities can lead to unauthorized access, data breaches, and disruptions in service. Companies that rely on these types of software need to prioritize security measures and stay updated on patches to protect their systems. As the threat landscape evolves, organizations must remain vigilant to mitigate risks associated with these attacks.

Impact: Security and networking appliances
Remediation: Companies should apply security patches as soon as they are available and regularly update their software to defend against these vulnerabilities.
Read Original
Actively Exploited

The latest Security Affairs Malware newsletter covers several significant malware threats that have emerged recently. Notably, a group identified as Stan Ghouls is targeting users in Russia and Uzbekistan using the NetSupport Remote Access Trojan (RAT), which allows attackers to control infected systems remotely. Another concerning development is the discovery of ZeroDayRAT, a new spyware designed to infiltrate both Android and iOS devices. Additionally, researchers have uncovered a Linux botnet named SSHStalker, which utilizes old-school IRC methods to compromise new victims. These activities demonstrate the evolving tactics of cybercriminals and emphasize the need for users and organizations to remain vigilant against these persistent threats.

Impact: NetSupport RAT, ZeroDayRAT (Android and iOS), SSHStalker Linux Botnet
Remediation: Users should implement security updates, monitor network activity for unusual behavior, and utilize endpoint protection solutions to mitigate these threats.
Read Original
PreviousPage 2 of 6Next