Google patches 43 vulnerabilities in Chrome browser 
 
Google launches Android bug bounty program 
By Doug Drinkwater | Jun 17, 2015 | Comment Now 
Up to US$8000 on offer.
 
More Java holes found in Google App Engine 
By Juha Saarinen | May 18, 2015 | Comment Now 
Google slow to respond.
 
Google builds Chrome tool to prevent phishing 
Apr 30, 2015 | Comment Now 
Extension aims to defend against attacks.
 
Google pays up front for bug hunting 
By Juha Saarinen | Feb 2, 2015 | Comment Now 
Introduces vulnerability research grants.
 
Google rethinks email service 
Oct 23, 2014 | Comment Now 
Offers ‘Inbox’ to customers on request basis.
 
Google patches 50 Chrome vulnerabilities 
By Juha Saarinen | Aug 27, 2014 | Comment Now 
Remotely exploitable holes plugged.
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Seek experiments with analytics 
By Penny Wolf | Jun 24, 2014 | Comment Now 
Looks to match jobs to candidate’s profile.
 
Google releases 64-bit version of Chrome  
By Juha Saarinen | Jun 4, 2014 | Comment Now 
Claims 25 percent speed improvement.
 
Chrome flags hijacking attempts 
By Darren Pauli | Feb 4, 2014 | Comment Now 
Hacking attempts grow at 'an alarming rate'.
 
New keylogging malware steals Tumblr log-in credentials 
By Doug Drinkwater | Dec 23, 2013 | Comment Now 
Chrome extension harvests personal info.
 
Google eyes password alternative for unlocking Chrome screens  
By Danielle Walker | Dec 12, 2013 | Comment Now 
Developers have proposed an authentication method that would allow Chrome apps to unlock users' screens in sleep mode.
 
Open Universities makes students sticky 
By Ry Crozier | Dec 11, 2013 | Comment Now 
Less likely to drop out of studies.
 
Microsoft releases Internet Explorer 11 for Windows 7 
 
Google adds a sector factor to Chrome passwords 
 
Google to axe 'risky' NPAPI support in Chrome 
Sep 25, 2013 | Comment Now 
Targets security risks, hang time.
 
Google to dump 'risky' NPAPI support in Chrome 
Sep 24, 2013 | Comment Now 
Targets security risks, hang time.
 
NBN Co reins in rollout transparency 
By Ry Crozier | Aug 30, 2013 | Comment Now 
[Blog post] Fresh wave of data files removed from website.
 
Fake Flash Player extensions foists spam  
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 759

Vote