The Hacker News | Biggest Information Security Channel

Google Releases Chrome Extension for End-To-End Email Encryption

Google Releases Chrome Extension for End-To-End Email Encryption

Back in june this year, Google announced an alpha Google Chrome extension called " End-to...
How To Run Almost Any Android App On Windows, OS X, Linux with Chrome

How To Run Almost Any Android App On Windows, OS X, Linux with Chrome

From last week, Google began paving the way to run Android apps on Chrome Operating System throu...
Malware Can Bypass Chrome Extension Security Feature Easily

Malware Can Bypass Chrome Extension Security Feature Easily

Researchers have uncovered a new social engineering trick that leads users to a malicious extens...
Google Chrome 64-bit Browser Finally Released As a Stable Version

Google Chrome 64-bit Browser Finally Released As a Stable Version

Along with the release of Chrome 37 for Windows, Mac, and Linux , Google today also released a l...
miniLock - Open Source File Encryption Tool from CryptoCat Developer

miniLock - Open Source File Encryption Tool from CryptoCat Developer

It’s the age of surveillance what made the Use of Encryption so widely that it has become a nee...
Hiding URLs in Google Chrome Could Be A Good Decision?

Hiding URLs in Google Chrome Could Be A Good Decision?

The collection of slashes and hyphens in URLs of websites make it look complicated and messy, no...
Malicious Chrome Extension Hijacks CryptoCurrencies and Wallets

Malicious Chrome Extension Hijacks CryptoCurrencies and Wallets

Although the number of malicious browser extensions has significantly increased in the past yea...
Chrome Remote Desktop for Android to Control Your PC from Anywhere

Chrome Remote Desktop for Android to Control Your PC from Anywhere

Have you ever been somewhere and urgently you need a file stored in your home computer ? This is...
Google Chrome vulnerability allows Websites to Eavesdrop on You

Google Chrome vulnerability allows Websites to Eavesdrop on You

Just imagine, you are sitting in front of your laptop and your laptop is listening to your near...
Converting Google Chrome into a Bugging Device by exploiting Speech Recognition feature

Converting Google Chrome into a Bugging Device by exploiting Speech Recognition feature

How many of you use Google Chrome for surfing the Internet and feel safe while working on it? ...
Adware Companies buying popular Chrome extensions to inject Ads and Malware

Adware Companies buying popular Chrome extensions to inject Ads and Malware

Browser extensions are extra features and functionality that you can easily add to Google Chrome, Fi...
Google Chrome to encrypt Stored Cookies by default to enhance browser security

Google Chrome to encrypt Stored Cookies by default to enhance browser security

When you visit a website, it stores some information on your system through a web browser for later ...
Master Password Protection added to Google Chrome's Password Manager

Master Password Protection added to Google Chrome's Password Manager

Just like other Web Browsers, The Google Chrome also offers a password manager feature that can sav...
Google Chrome adds automatic malware blocking for suspicious downloads

Google Chrome adds automatic malware blocking for suspicious downloads

Today Malware is a very real threat, and if you’re not careful about what you download and insta...
Google detected Malware on PHP.net website; Flagged as 'Suspicious' site

Google detected Malware on PHP.net website; Flagged as 'Suspicious' site

If you are today trying to visit the php.net website, an official website of the PHP scripting l...
Google added malicious apps scanner to Chrome Web Store

Google added malicious apps scanner to Chrome Web Store

Over the past few years, Cyber Criminals have choose the official Google Chrome Web Store to pus...
Google Chrome Inbuilt Flash player allows Webcam Hacking

Google Chrome Inbuilt Flash player allows Webcam Hacking

No longer limited to Hollywood movies about cybercrime, webcam hacking has stealthily and aggressiv...
Bypassing Google Two Factor Authentication

Bypassing Google Two Factor Authentication

Duo Security found a loophole in Google's authentication system that allowed them to Google&#...
Fake Turkish digital Certificates blocked by Browser vendors

Fake Turkish digital Certificates blocked by Browser vendors

It’s the news of the day, a fraudulent digital certificate that could be used for active phishin...
Google Chrome blocks access to Twitpic for Malware risk

Google Chrome blocks access to Twitpic for Malware risk

Suddenly today Google Chrome start detecting Twitpic.com as malware threat. Twitpic is one of the ...