Join thousands of people who receive the latest breaking cybersecurity news every day.
In the face of continued attacks targeting its hugely popular Gmail service, Google has put together a checklist to help Gmail users better secure their accounts by looking at the settings in their inboxes, their browsers and their PCs. The security guide doesn’t automate any of these tasks for users, but instead gives them a guide comprising 18 steps to help lock down their Gmail inboxes.
Google has added a two-factor authentication mechanism to the login procedure for its Google Apps offerings, hoping that the addition will help cut down on the amount of fraudulent activity on these accounts.
With news swirling that Google is ditching the internal use of Windows over security concerns, Microsoft moved swiftly to counter-attack and defend the security posture of its flagship operating system.
Google has pushed out another automatic Chrome browser update to fix multiple security issues that could expose users to hacker attacks.Google Chrome 5.0.375.55, available for Windows, Mac and Linux, addresses at least two “high risk” vulnerabilities and several security-related denial-of-service crashes.
Google has released a new online training course for Web application developers designed to teach them how to avoid common programming mistakes that lead to vulnerabilities such as cross-site scripting, cross-site request forgery and others.
Google may have threatened to leave China in order to keep us all from concluding that “the cloud” can’t be secured. But isn’t that precisely what we should conclude based on the fact that Google chose to leave China? Read the full article. [Computerworld]
Google has announced that Google Docs will drop support for Microsoft’s nearly nine-year-old Internet Explorer 6 (IE6) browser starting on March 1.Ironically, if Google had taken its anti-IE6 advice to heart before hackers broke into its corporate network last year, it might not now be mulling whether to abandon the Chinese search market. Read the full story [ComputerWorld]
InfoSec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content.