Google reveló el ataque DDoS más poderoso de la historia

Esta semana, the Google Cloud team talked about a previously unknown DDoS attack that targeted a Google service back in September 2017 y alcanzó su punto máximo en 2.54 TB/seg, convirtiéndolo en el ataque registrado más poderoso de la historia. Pronto, analysts from the Google Threat Analysis Group (ETIQUETA) published their report on the incident, in which they saidSeguir leyendo Google reveló el ataque DDoS más poderoso de la historia

Expertos de Google e Intel advierten sobre peligrosos errores de Bluetooth en Linux

Los ingenieros de Google e Intel advierten sobre peligrosos errores de Bluetooth que amenazan a todas, excepto a las últimas versiones del kernel de Linux.. Los errores se conocen colectivamente como BleedingTooth y están asociados con la pila BlueZ., que es ampliamente utilizado en distribuciones de Linux, así como dispositivos IoT industriales y de consumo. (con linux 2.4.6 y más alto). «This issue allowsSeguir leyendo Expertos de Google e Intel advierten sobre peligrosos errores de Bluetooth en Linux

Google recluta un equipo de expertos para encontrar errores en aplicaciones de Android

ZDNet reports that a number of new positions have been added to Google’s job list. The fact is that Google appears to be recruiting a team of Android security experts that will be looking for vulnerabilities in critical applications from the Google Play Store. According to Sebastian Porst, software development manager for Google Play Protect,… Seguir leyendo Google recluta un equipo de expertos para encontrar errores en aplicaciones de Android

Investigador obtenido $10,000 Al encontrar una vulnerabilidad XSS en Google Maps

Israeli cybersecurity specialist Zohar Shachar talked about his discovery of XSS vulnerability in Google Maps in 2019, and then found out that Google was unable to fix it from the first time. The issue was related to the Google Maps feature that allows users to create their own maps. Such maps can be exported inSeguir leyendo Investigador obtenido $10,000 Al encontrar una vulnerabilidad XSS en Google Maps

Los servicios en la nube de Google se utilizan para el phishing

Atacantes, whose main goal is to steal various credentials, are increasingly turning to public cloud services to host decoy files and phishing pages. Even Google services are now being used for phishing. Check Point experts warn that earlier this year they discovered a campaign, which was abusing Google cloud services. The scammers have developed anSeguir leyendo Los servicios en la nube de Google se utilizan para el phishing

Linus Torvalds aprobó la exclusión del término esclavo, lista negra y otros del código del kernel de Linux

Más recientemente, we talked that the IT community has also returned to discussing inappropriate and offensive terminology under the influence of Black Lives Matter protests that swept across the United States (y no solo). Linus Torvalds did not stand aside and approved excluding the terms slave, lista negra, and others from the Linux kernel code. ManySeguir leyendo Linus Torvalds aprobó la exclusión del término esclavo, lista negra y otros del código del kernel de Linux

Google Maps helps users protect themselves from COVID-19

Google has added a number of new features to its mapping service to help users protect themselves from COVID-19. Google Maps now provides travelers and people on duty with public transport information on how the COVID-19 pandemic could affect their trip. Among other updates, now the Google Maps application will display notifications of restrictions imposedSeguir leyendo Google Maps helps users protect themselves from COVID-19

Los expertos de Google hablaron sobre las vulnerabilidades en los sistemas operativos de Apple

Google Project Zero specialists discovered and described many vulnerabilities in Apple’s operating systems. Por ejemplo, they are part of the Image I/O framework, which is used for parsing images and is part of iOS, Mac OS, tvOS y watchOS. Overall were identified 14 vulnerabilidades, six of which directly affect Apple Image I/O, and eight more problemsSeguir leyendo Los expertos de Google hablaron sobre las vulnerabilidades en los sistemas operativos de Apple

Due to the pandemic Google developers re-enabled FTP support for Chrome

Más reciente, I wrote that Firefox developers plan to remove from their browser support for the FTP protocol, as consider it to be unsafe. Al mismo tiempo, Google re-enabled FTP support for Chrome. Google developers have been talking about abandoning FTP since 2014, since very few browser users (0.1-0.2%) usa el protocolo. In 2018,Seguir leyendo Due to the pandemic Google developers re-enabled FTP support for Chrome

Firefox se niega a admitir el protocolo FTP

ZDNet informa que los desarrolladores de Mozilla consideran que FTP es un protocolo inseguro y pronto se negarán a admitirlo en Firefox. Por lo tanto, los usuarios ya no podrán subir archivos a través de FTP, y es posible que no pueda ver el contenido de los enlaces y carpetas FTP en un navegador. “Hacemos esto por seguridad… Seguir leyendo Firefox se niega a admitir el protocolo FTP