«
Expand/Collapse
905 items tagged "google"
Related tags:
security vulnerabilities [+],
multiple [+],
misc [+],
chaos communication congress [+],
android [+],
wordpress [+],
security [+],
recovering passwords [+],
google maps [+],
decoder [+],
remote [+],
uri [+],
street view [+],
privacy [+],
metro [+],
hacking [+],
gtalk [+],
google translation [+],
facebook [+],
driver dll [+],
denial of service [+],
data [+],
apple [+],
advisory [+],
web [+],
trojan [+],
toy [+],
system compromise [+],
spoofing [+],
secunia [+],
read [+],
party plugin [+],
mime messages [+],
maps [+],
malware [+],
ivan nestlerode [+],
information disclosure [+],
handler [+],
google street view [+],
google street [+],
google analytics [+],
finds [+],
dynamic link library [+],
dll [+],
daniel bartlett [+],
code execution [+],
code [+],
buffer overflow vulnerability [+],
analytics [+],
21c3 [+],
x google [+],
whitepaper [+],
warning [+],
view [+],
video [+],
vendor [+],
vectors [+],
update [+],
tool [+],
time [+],
tavis ormandy [+],
street [+],
steffen meschkat [+],
signing [+],
security study [+],
scanner [+],
scan [+],
safari [+],
reverse dns [+],
regulators [+],
python [+],
project [+],
offers [+],
news [+],
new [+],
million [+],
microcontrollers [+],
member [+],
makes [+],
mac os [+],
javascript [+],
integrity protection [+],
inj [+],
hangout [+],
hackaday [+],
fun [+],
ftc [+],
felix [+],
engineer [+],
debian [+],
darknet [+],
darkb [+],
client platforms [+],
client [+],
breach [+],
based buffer overflow [+],
application programming interface [+],
api [+],
answer [+],
Tools [+],
5 million [+],
zombie [+],
year [+],
yahoo [+],
working [+],
win [+],
whmcs [+],
whims [+],
while [+],
weeks [+],
web interface [+],
ways [+],
watchdog [+],
version [+],
verge [+],
v3n0m [+],
unleashes [+],
undiscovered [+],
uk regulator [+],
uk mps [+],
trial [+],
transitioned [+],
track option [+],
track [+],
than half [+],
temperature sensor [+],
television programs [+],
television [+],
teensiest [+],
team [+],
targets [+],
surveillance [+],
subtitle [+],
student data [+],
student [+],
stresses [+],
stgo [+],
steve lee [+],
staff [+],
stack [+],
ssos [+],
ssl [+],
sse [+],
spyware [+],
spooks [+],
spike [+],
spamming [+],
spam [+],
smartphones [+],
smartd [+],
small claims [+],
small [+],
slammed [+],
sketchup [+],
side projects [+],
showdown [+],
shiny new toy [+],
settles [+],
set [+],
service vulnerability [+],
server [+],
series 3 [+],
sensor data [+],
self drive car [+],
sees [+],
security flaw [+],
security bugs [+],
security advisory [+],
sebastian thrun [+],
search directives [+],
search [+],
scrutiny [+],
screw [+],
score [+],
scanning [+],
santiago chile [+],
santiago [+],
samsung [+],
saber [+],
rush [+],
roy macdonald [+],
rohit [+],
robot drives [+],
robot [+],
ricky sumbody [+],
ricky [+],
retina [+],
researchers [+],
renderings [+],
remote control car [+],
releases [+],
regulator [+],
regular expression [+],
redmond report [+],
recording [+],
recaptcha [+],
reality project [+],
real [+],
radio signals [+],
q media [+],
python script [+],
protection chief [+],
protection [+],
profile [+],
probe [+],
privacy suit [+],
privacy policy [+],
privacy policies [+],
privacy lawsuit [+],
privacy agreement [+],
prior [+],
poc [+],
pitfalls [+],
pirate bay [+],
pimp [+],
phishing [+],
pepper flash [+],
pakistan [+],
out [+],
oscar [+],
ordered [+],
option [+],
opens [+],
open sources [+],
on street [+],
old habits [+],
old [+],
offer [+],
nsa [+],
nirav [+],
nexus [+],
networked devices [+],
network [+],
mutation [+],
must [+],
mps [+],
mozilla releases [+],
mozilla [+],
military network [+],
microsoft [+],
micalizzi [+],
memory corruption [+],
megaboy [+],
market [+],
malicious web [+],
makers [+],
loss [+],
links [+],
lightsaber [+],
light saber [+],
lifelike [+],
library of alexandria [+],
leon [+],
language [+],
knew [+],
kills [+],
kevin [+],
kayak [+],
justice department [+],
justice [+],
joke [+],
joins [+],
javascript client [+],
japanese market [+],
irc [+],
iranian [+],
iphone [+],
ipad [+],
investigate [+],
intro [+],
internet risk [+],
information disclosure vulnerability [+],
importance [+],
identifies [+],
html [+],
household devices [+],
home automation [+],
home [+],
high profile [+],
high [+],
hide malware [+],
heap [+],
head mounted displays [+],
hard time [+],
hard [+],
hands [+],
hackerspace [+],
hackers [+],
hack [+],
habits [+],
gus [+],
gui tool [+],
gt 4 [+],
government surveillance [+],
government [+],
google yahoo [+],
google tools [+],
google searches [+],
google search [+],
goodork [+],
glass [+],
gaping holes [+],
gaiaserver [+],
full [+],
friend [+],
freestyle kayak [+],
freestyle [+],
flash plugin [+],
firefox [+],
fire [+],
file [+],
fbi [+],
extends [+],
expression [+],
exposes [+],
exploits [+],
european data protection [+],
european [+],
epic [+],
entertainment [+],
employee directories [+],
embedder [+],
emanuele [+],
ebay [+],
easier [+],
eagle cad [+],
eagle [+],
docs [+],
dismiss [+],
disclosure [+],
die hard [+],
developers conference [+],
dev [+],
destroy [+],
department [+],
denies [+],
denial [+],
demands [+],
demand [+],
debacle [+],
day [+],
cyber attacks [+],
curiosity [+],
crack [+],
cpu [+],
control [+],
compositor [+],
clone [+],
claims [+],
china [+],
chile [+],
charlie eriksen [+],
car [+],
cad [+],
button [+],
browser makers [+],
browser [+],
brings [+],
bouncer [+],
book [+],
bod [+],
blog [+],
blacklist [+],
bans [+],
bank accounts [+],
authorities [+],
aus [+],
audio [+],
attackers [+],
atari 2600 [+],
atari [+],
assembly [+],
assembles [+],
assange [+],
arduino [+],
apps [+],
antitrust concerns [+],
andrea [+],
alexandria [+],
alert [+],
accounts services [+],
account passwords [+],
Software [+],
Requests [+],
Rasberry [+],
Pentesting [+],
Hardware [+],
Hackerspaces [+],
General [+],
FCC [+],
Bugs [+],
hacks [+],
vulnerability [+],
talk [+],
chrome [+],
zuckerberg,
zero day,
zero,
yellow dots,
yale winds,
yale,
xteardown,
xss,
xperiaplay,
xml,
writers,
wristwatch,
wrap up,
wrap,
wpa wpa2,
wpa,
worldwide,
world,
workout facilities,
words,
word war,
word,
wonk,
woes,
wiretapping,
wiretap,
wipes,
wine,
windows secrets,
windows,
wind,
will ignore,
will,
wildcard,
wii fit,
wii,
wifi,
wi fi access,
wi fi,
whois web,
whim,
websitedefender,
website audit,
website,
websense,
webkit,
webapps,
web proxy,
web password,
web monitoring,
web giant,
web authors,
web apps,
way,
wave,
washington monument,
washington,
warns,
warn,
ward off,
war,
wanna,
wallet,
vupen,
vulnerability research,
vulnerability reports,
vulnerabilities,
vsr,
volkswagen golf,
vladimir,
virus writers,
virus vendors,
virus,
virtual security,
vienna,
video streams,
victimb,
verizon,
utopia,
utah,
using,
users,
user,
usefull info,
usa,
url,
uri spoofing,
urchin 5,
urchin,
updated,
unveils,
universal service fund,
unencrypted data,
uk government,
udot utah,
ubuntu,
typo,
txt,
two wheels,
two,
twitter,
tweaks,
tweak,
tv devices,
tutorial,
triumphs,
tries,
trends,
tree,
treadmill,
transportation,
translate,
traget,
tracking,
traceroute,
tour,
toronto,
topic,
top,
toolbar,
tool works,
tool 1,
tom stracener,
today,
toaster oven,
tip line,
tie,
thyne,
threats,
thomas clauser,
this,
theharvester,
tgz,
ted,
tech,
target domain,
target,
tar gz,
tar,
taking security,
tags,
tablet controlled,
t ipad,
syhunt,
svn,
suspect,
surfing experience,
super nintendo,
summer,
suit claims,
sued,
subsidiary,
subdomains,
subdomain names,
style sheet,
style,
stuff,
study,
struggling,
store,
stockholm,
still,
step direction,
step checklist,
step,
stealth attack,
stealth,
status messages,
state,
startup,
stalking,
stack overflow,
stable,
ssl certificates,
sqli,
sql injection,
spy,
spreading,
spotlight,
sparkfun,
space labs,
souza,
south korea,
sourceforge,
sound sensitive,
sort,
sophos products,
sophos,
sony,
solder,
social networking service,
social engineering,
snooping,
snoop,
snes,
snarfing,
snared,
sms,
slides,
slaps,
skyhook wireless,
skpr,
skipfish,
site,
simple hello,
simon,
signs,
side,
shirley,
shells,
shell,
serving,
service,
server side javascript,
server side,
sends,
sending,
self,
segway,
security vulnerability,
security tool,
security threat,
security risks,
security research,
security patches,
security notice,
security holes,
security fixes,
security experts,
security credentials,
security alliance,
security advice,
secure browsing,
secrets,
sebastian,
search queries,
search extension,
search activity,
script engine,
script,
scmagazine,
science fairs,
science,
sci fi,
schools,
scholar,
schmidt,
schematics,
scare,
scapy,
scams,
sans,
sandbox model,
sandbox,
san,
same time,
safer use,
s system,
s market,
ryan ohara,
ryan anguiano,
ryan,
rustock,
runs,
ruby tag,
ruby,
rseau,
routeur,
router,
route,
rotors,
rooted,
roomba,
rolls,
roll,
rogue,
robots,
robotic,
roboform,
road bike,
rise,
rim,
rig,
rick redman,
rhino,
revision,
retro,
retired,
rest of the world,
responds,
research,
requirements,
request,
report details,
report,
repairing,
rename,
removes,
removal tool,
remotely,
remote exploit,
reflow,
redirects,
redirect,
record,
reconnaissance,
rapped,
rapid,
ran detailed,
raid,
ragan,
rafal los,
quot,
quickrecon,
quick,
question,
queries,
quad,
pulls,
pullout,
pulled,
proxy,
protect,
proposes way,
propose,
proof of concept,
proof,
programming environment,
programming competition,
program,
profiles,
processsing,
processing,
process,
probleme,
probes,
private database,
privacy settings,
privacy protection,
privacy laws,
privacy law,
privacy issues,
privacy invasion,
privacy info,
privacy event,
privacy concerns,
prius,
price,
pretty pictures,
prediction,
powermeter,
power meter,
power,
pov,
potential,
post,
ported,
porta 80,
port 31337,
port,
popup blocker,
popup,
popular science,
popular,
pop up block,
poor,
political agenda,
policy inquiries,
police raid,
police,
poisons,
plugs,
plug ins,
plots,
player,
plastic printer,
plastic,
plaster,
plain text passwords,
pitches,
piracy,
pinpoint,
pinger,
pin security,
pin,
picasa,
photon,
phony,
phone,
phish,
phil,
personal data,
pentesters,
pentest,
penetration testers,
penetration,
peephole,
pdf,
pcb,
pc enthusiast,
pays,
payload,
pay,
paul blue,
paul,
patrick chambet,
patent,
patches,
passwords,
password,
participant organizations,
paranoid,
paper,
page,
pact,
packet storm,
overtakes,
oven,
oregon court,
oracle report server,
oracle,
opt,
operational web,
operating system,
opendns,
open source project,
open source implementation,
open,
oob,
ons,
online,
offline,
official,
oct,
ocr,
o hara,
now,
notice,
not,
nonsense,
nintendo,
nikolai,
nfc,
net neutrality,
net,
neat project,
nbsp,
nasties,
narc,
nabbed,
mystery,
mysql,
mvsa,
muzzle,
music service,
murdoch,
msn,
msf,
ms security,
mr.x,
mozilla add ons,
moxie,
motorcycle trips,
motivated,
morse code,
morse,
months,
monopoly,
mod,
mobile version,
mobile payment solution,
mobile callers,
mitm,
miniature robot,
mini,
mike,
might,
microwave,
microsoft claims,
microcontroller,
metropolitan,
meterpreter,
meter,
message security,
message center,
message,
memory,
meet,
mechanical claw,
may,
math,
mass.,
mass,
marvin ammori,
marlinspike,
marketplace,
mapping service,
mapping,
mapped,
map,
manipulation,
malware trail,
malicious hacker,
malicious,
malaysian government,
mal,
major flaw,
mail,
machine,
mac linux,
mac,
lyk,
lying,
low cost,
low bandwidth,
lot,
los angeles,
lord,
lookup,
location,
load,
list,
link,
lighting market,
lighting,
life,
lien,
licensing system,
licensing,
librarie,
lfi,
lets,
legislation,
legal,
leds,
led matrix,
led,
leap,
leaks,
leaked,
layout files,
layout,
lawyers,
laws,
lawmakers,
law requirements,
launched,
lastenrad,
laser turret,
laser,
lapd,
labyrinth game,
labyrinth,
l. aaron kaplan,
kopete,
knocked,
kinect,
keypad,
kenyan,
keeps,
kaspersky,
k bounty,
julius genachowski,
judge orders,
judge grants,
judge,
jpeg,
joomla,
johnny long,
johannesburg,
joey calca,
joe,
job,
jer,
jeff bryner,
jean michel picod,
java,
jamal bandukwala,
jailbreak,
issue,
iphone 4,
ip geolocation,
invitations,
invests,
invest,
intrusion,
internet explorer,
internet,
international benchmark,
interesting solutions,
intelligence,
intel,
integer overflow vulnerability,
instant,
insider,
insecure,
injection,
information,
infiltrate,
india,
independent watchdogs,
independent,
inclusion,
in street,
illegally,
iii,
igor,
ibm,
hydra,
huge rise,
huge list,
https,
http,
htop,
htmlgen a,
household penetration,
hot topic,
hong kong,
home lighting,
holes,
hit,
history feature,
history,
hijacking,
hijack,
high risk,
high altitude balloons,
hidden paths,
hexacopter,
hello community,
hardware kit,
hardens,
handshake,
hand,
halts,
hadoop,
hacking search,
hacker test,
hacker challenge,
hacker attack,
hacker activity,
hacker,
hacked,
guru,
guide,
groupon,
graph,
gpu,
gps,
governments,
government data,
gov,
goolge,
googlee,
google urchin,
google uk,
google travelling,
google toolbar,
google sketchup,
google search results,
google redirects,
google picasa,
google hacks,
google hacking,
google gears,
google cache,
golf cart,
gmail,
glue,
globe,
giant leap,
gglebot,
gggooglescan,
germany,
germans,
german postal service,
gentle slope,
gears,
gchq,
gambling,
gambles,
galaxy,
gadgets,
gadget world,
gadget,
gabble,
g page,
free food,
free error,
fraudulent,
france,
foursquare,
four months,
four,
found,
forum search,
forgery,
forgers,
forfeits,
fools,
focus events,
focus,
florida,
floats,
flash,
flap,
fix,
first,
firmware versions,
firesheep,
fires,
fire and light,
finding,
finder,
financial times,
fil,
figure,
fiber,
feds,
federal,
feature address,
fcc enforcement,
fantastic forum,
false alarm,
fake,
fairs,
factor authentication,
factor,
facial recognition,
faced,
face,
fabrice jaubert,
f king,
extractor,
exploited,
exploitation,
exploit,
exhibit space,
evasive,
evasion,
evalbot,
error,
enlist,
enhance,
engraver,
enging,
engineered,
engine crawler,
engine,
enforced,
end,
encrypt,
emergency patch,
emergency,
emails,
elite,
electronic retailer,
electricity meters,
egypt,
earth version,
earth,
e mail addresses,
dystopian visions,
dutch government,
dutch company,
dutch,
dupont,
duke,
dual boot with windows,
drug ads,
driving cars,
driver developers,
driven interface,
drive space,
dpapi,
download,
dos,
dorkmaster,
dork,
doors,
doomsayers,
don,
domain,
doing the rounds,
dock,
divulges,
ditching,
ditches,
disrupts,
disrupting,
discrete components,
disco,
directed,
digital calipers,
digital,
digikey,
dhclient,
development hardware,
development,
developers,
devel,
deutsche,
detection,
details,
desktop image,
desktop,
desk,
design bugs,
design,
deny,
demos,
demo party,
demo board,
deliberately,
deletion,
defends,
default,
decision,
deaf ears,
dave kennedy,
database tool,
database,
data requests,
data execution prevention,
dae,
czech ing,
cyberattacks,
custom search engine,
custom,
curbs,
css,
cryptography,
cry,
cross site scripting,
cross,
critical vulnerability,
credit card numbers,
credit,
credential,
creating,
crash,
cover art,
court demands,
couple,
cost,
corrects,
corporate philosophy,
corporate,
cops,
cooking,
cookies,
controlling,
continue,
contests,
contact,
console,
congress,
confirms,
condemns,
computer thief,
computer,
compromise,
component version,
compatible board,
communications infrastructure,
communication,
comfort bus,
com,
collection,
code repository,
cnc machine,
cnc,
cloud,
clock,
client server application,
clean,
claw,
clauser,
class action lawsuit,
clash,
claim,
circumventing,
circuit,
cia,
chromebook,
chrome version,
chris nickerson,
chipset,
chinese web,
chinese students,
chinese schools,
chinese new year,
chinese,
china talks,
china site,
china row,
china issues,
checklist,
charliex,
charlatans,
chaosmap,
change,
challenge,
cgi,
certificates,
certificate,
certain,
center,
censorship of the internet,
censorship,
cell,
cash and prizes,
cart,
carlos perez,
cargo bike,
cargo,
card,
capable phones,
cant block,
canadian drugs,
can,
cameras,
camera rig,
camera,
calls,
california,
calca,
cache,
cable,
bypassed,
buzz,
bus,
bugtraq,
bug hunters,
bug,
buffer memory,
bruteforce attack,
browser policy,
browser bugs,
brown rob ragan,
broadband,
british government,
british,
britain,
brass tubes,
brass,
boycott google,
boycott,
bounty programs,
bounty program,
bounty hunters,
bounty,
botnets,
botnet,
bot,
boston,
boss,
booty,
boosts,
bonkers,
bonanza,
bof,
body,
bo,
bluray,
blogging,
blocks,
block menu,
blob,
blippy,
bling,
blasts,
black hat,
bit,
bipeds,
bios,
bing,
bike,
big g,
benjamin,
ben,
begins,
banner,
ball,
balance board,
bad idea,
backlash,
awus,
average person,
autonomous vehicle,
autonomous car,
autonomous,
automatic search,
authors,
author,
authentication request,
authentication,
australian privacy commissioner,
australian,
australia,
aurora exploit,
aurora,
attracting,
attiny,
attacker,
attack,
aspx,
asks,
asia,
array,
arbitrary code execution,
april fools prank,
april,
approach,
applet,
apple safari,
apple pushes,
apple ipad,
appeal,
app,
apache,
ants,
antonio,
antivirus software,
antivirus,
anti virus,
anti,
anonymous,
anonplus,
anon,
anguiano,
and,
analyticator,
america,
amazon river,
amazon,
amateurs,
alleged,
allegations,
algorithm,
alexandre souza,
aircrack,
agenda,
against,
adwords,
adsense,
adobe flash,
adobe,
admits,
adk,
addon,
add,
acts,
activists,
acronym,
accused,
access 2,
accer,
abu dhabi,
Weekly,
Visulization,
Technologies,
Supporto,
Support,
Skype,
Newbie,
Issues,
Howto,
HackIt,
Fixes,
ExploitsVulnerabilities,
Discussion,
Countermeasures,
BackTrack,
Area,
500m
-
-
19:00
»
Hack a Day
Of all the things you never would have guessed you’d need just ten years ago, a YouTube subscriber counter would probably rank highly. You would have guessed that the little hits of dopamine accompanying each tick upward of a number would be so addictive?
As it turns out, lots of people wanted to keep a running total of their online fans, and a bewilderingly varied ecosystem of subscriber counters has cropped up. All of them rely on the API that YouTube exposes for such purposes, which as [Brian Lough] points out is about to change and break every subscription counter ever made. In the YouTube sub counter space, [Brian] is both an enabler – he built an Arduino wrapper to fetch YT sub counts easily – and a serial builder of displays for other YouTubers. The video below shows a collection of his work, many based on RGB LED matrix display, like the one used in his Tetris-themed sub counter. They’re all well-built, nice to look at, and sadly, destined for obsolescence sometime in August when the API changes.
The details of the API changes were made public in April, and for the subs count it amounts to rounding the count and displaying large counts as, for instance, 510k as opposed to 510,023. We’re confident that [Brian] and other display builders will be able to salvage some of their counters with code changes, but others will probably require hardware changes. Thanks, YouTube.
-
-
10:00
»
Hack a Day
Classes are over at Cornell, and that means one thing: the students in [Bruce Land]’s microcontroller design course have submitted their final projects, many of which, like this flight control system for Google Earth’s flight simulator, find their way to the Hackaday tips line.
We actually got this tip several days ago, but since it revealed to us the previously unknown fact that Google Earth has a flight simulator mode, we’ve been somewhat distracted. Normally controlled by mouse and keyboard, [Sheila Balu] decided to give the sim a full set of flight controls to make it more realistic. The controls …read more
-
-
4:00
»
Hack a Day
There was a time when the average person was worried about the government or big corporations listening in on their every word. It was a quaint era, full of whimsy and superstition. Today, a good deal of us are paying for the privilege to have constantly listening microphones in multiple rooms of our house, largely so we can avoid having to use our hands to turn the lights on and off. Amazing what a couple years and a strong advertising push can do.
So if we’re going to be funneling everything we say to one or more of our corporate …read more
-
-
1:00
»
Hack a Day
In European medieval folklore, a practitioner of magic may call for assistance from a familiar spirit who takes an animal form disguise. [Alex Glow] is our modern-day Merlin who invoked the magical incantations of 3D printing, Arduino, and Raspberry Pi to summon her familiar Archimedes: The AI Robot Owl.
The key attraction in this build is Google’s AIY Vision kit. Specifically the vision processing unit that tremendously accelerates image classification tasks running on an attached Raspberry Pi Zero W. It no longer consumes several seconds to analyze each image, classification can now run several times per second, all performed locally. …read more
-
-
19:00
»
Hack a Day
With Google’s near-monopoly on the internet, it can be difficult to get around in cyberspace without encountering at least some aspect of this monolithic, data-gathering giant. It usually takes a concerted effort, but it is technically possible to do. While [Mat] is still using some Google products, he has at least figured out a way to get Google Home to work with location data without actually sharing that data with Google, which is a step in the right direction.
[Mat]’s goal was to use Google’s location sharing features through Google Home, but without the creepiness factor of Google knowing everything …read more
-
-
21:25
»
Packet Storm Security Advisories
Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in the Google Doc Embedder plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.
-
-
16:00
»
SecuriTeam
Google Chrome Prior to 23.0.1271.97 is prone to multiple security vulnerabilities.
-
-
16:00
»
SecuriTeam
Google Chrome is prone to a use-after-free vulnerability and an arbitrary-file-write vulnerability.
-
-
16:00
»
SecuriTeam
Google Chrome is prone to multiple security vulnerabilities.
-
-
16:26
»
Hack a Day
The Dubjoy project was stopped dead in its tracks when the newest version of the Google Chrome browser stopped using Adobe’s flash plugin and transitioned to their own called Pepper Flash. The aim of development was to produce a browser-based editor for translating the audio track of a video clip. After a bit of head scratching and [...]
-
-
15:44
»
Packet Storm Security Tools
v3n0m Scanner is a mutation of smartd0rk3r and can search for 10,446 Google dorks. It then performs several checks for vulnerabilities in the sites.
-
-
16:00
»
SecuriTeam
Google Chrome is prone to multiple vulnerabilities.
-
-
11:01
»
Hack a Day
[Kevin]‘s friend is a remarkably helpful engineer, and when his friend gets requests to help out on a few projects he always has a hard time saying no. Really, [Kevin]‘s friends’ time is much too valuable to take up many more projects, but saying no to someone will drag you down. To alieve his friend [...]
-
-
3:00
»
Hack a Day
It’s no secret that Google has been scanning hundreds of thousands of books in the hope of recreating the Library of Alexandria. Publishers and authors really didn’t like that idea, so the Google books team is doing the next best thing: they’re releasing the plans for a very clever book scanner in the hope others will [...]
-
-
11:31
»
Hack a Day
Google TV is a network connected television. It does what you would think: plays television programs, streams media from the internet, and allows you to open URLs on your TV. But one nice feature is that it can also be controlled over the network rather than just via an IR remote. Google publishes apps which [...]
-
-
17:00
»
SecuriTeam
Google Chrome is prone to Denial Of Service Vulnerability .
-
-
17:00
»
SecuriTeam
Google Chrome is prone to a use-after-free vulnerability and an arbitrary-file-write vulnerability.
-
7:00
»
Hack a Day
Google+ Hangouts provide a group video chat with the ability to add apps. [RobotGrrl] created a Node.js web app to control an Arduino that can be added to a Hangout. There’s a Javascript client that runs inside of the Hangout and communicates with the Node.js server running on an EC2 server over WebSockets. The server receives this [...]
-
-
17:00
»
SecuriTeam
This allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
-
17:00
»
SecuriTeam
This allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to a regular expression.
-
-
17:00
»
SecuriTeam
This allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
-
-
21:52
»
SecDocs
Authors:
Daniel Bartlett Tags:
Google Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: A look at methods of locating vulnerable sites via google and exploiting them with no user interaction and how to prevent your code being vulnerable. People learn a little about scripting for the web and hardly ever about security. This leaves us with many issues on many sites. The simplest of things get overlooked and can often lead to full system compromise. Technically this talk focuses on PHP since it is extreamly commonplace and people pick it up reasonably quickly and easily. Looking at the largest and smallest of errors in code, explaining how to exploit, how to rectify and how to inform. Many people overlook that, disclose what you find, tell the owner of the site! We will discuss the scripts and programs that have been developed for automating the whole process, even down to logging all the info in a nice little web application.
-
21:52
»
SecDocs
Authors:
Daniel Bartlett Tags:
Google Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: A look at methods of locating vulnerable sites via google and exploiting them with no user interaction and how to prevent your code being vulnerable. People learn a little about scripting for the web and hardly ever about security. This leaves us with many issues on many sites. The simplest of things get overlooked and can often lead to full system compromise. Technically this talk focuses on PHP since it is extreamly commonplace and people pick it up reasonably quickly and easily. Looking at the largest and smallest of errors in code, explaining how to exploit, how to rectify and how to inform. Many people overlook that, disclose what you find, tell the owner of the site! We will discuss the scripts and programs that have been developed for automating the whole process, even down to logging all the info in a nice little web application.
-
21:52
»
SecDocs
Authors:
Daniel Bartlett Tags:
Google Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: A look at methods of locating vulnerable sites via google and exploiting them with no user interaction and how to prevent your code being vulnerable. People learn a little about scripting for the web and hardly ever about security. This leaves us with many issues on many sites. The simplest of things get overlooked and can often lead to full system compromise. Technically this talk focuses on PHP since it is extreamly commonplace and people pick it up reasonably quickly and easily. Looking at the largest and smallest of errors in code, explaining how to exploit, how to rectify and how to inform. Many people overlook that, disclose what you find, tell the owner of the site! We will discuss the scripts and programs that have been developed for automating the whole process, even down to logging all the info in a nice little web application.
-
-
7:45
»
SecDocs
Authors:
Steffen Meschkat Tags:
Javascript Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The web application programming interface (API) that allows to embed google maps in web pages is quite simple, if you speak javascript, yet it employs some of the more sophisticated concepts of the language, such as custom objects and closures. So if you don't speak javascript yet, but want to learn it, using the google maps API gives you a head start. We will walk through the components of the google maps API, emphasizing the javascript language features and their application to the API design as well as discussing the API itself.
-
7:45
»
SecDocs
Authors:
Steffen Meschkat Tags:
Javascript Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The web application programming interface (API) that allows to embed google maps in web pages is quite simple, if you speak javascript, yet it employs some of the more sophisticated concepts of the language, such as custom objects and closures. So if you don't speak javascript yet, but want to learn it, using the google maps API gives you a head start. We will walk through the components of the google maps API, emphasizing the javascript language features and their application to the API design as well as discussing the API itself.
-
-
6:30
»
Hack a Day
Inspired by the many autonomous rovers such as Curiosity and the self-driving Google car, [Rohit] decided to build his own by taking an off-the-shelf remote control car and adding his own electronics. Unfortunately, he couldn’t find the datasheet for the chip used to receive radio signals and drive the motors, so he ended up building his [...]
-
-
17:00
»
SecuriTeam
Google Chrome is prone to multiple vulnerabilities.
-
17:00
»
SecuriTeam
Google Chrome is prone to multiple vulnerabilities.
-
-
17:00
»
SecuriTeam
Google Chrome is prone to multiple security vulnerabilities.
-
17:00
»
SecuriTeam
Google Chrome is prone to multiple vulnerabilities.
-
17:00
»
SecuriTeam
Google Chrome is prone to multiple vulnerabilities.
-
-
17:00
»
SecuriTeam
Google Chrome is prone to multiple vulnerabilities..
-
17:00
»
SecuriTeam
Google Chrome is prone to multiple vulnerabilities.
-
17:00
»
SecuriTeam
Google Chrome is prone to multiple vulnerabilities.
-
17:00
»
SecuriTeam
Google Chrome OS for Cr-48, Samsung Series 5, Samsung Chromebox Series 3, and 5 550 Chromebook platforms is prone to multiple unspecified vulnerabilities.
-
17:00
»
SecuriTeam
Google Chrome is prone to multiple remote memory-corruption vulnerabilities.
-
-
5:00
»
Hack a Day
It seems that some of the Nexus 7 models have an assembly issue that makes the bezel uneven with the screen. It’s just in one spot but your shiny new toy shouldn’t have this kind of problem. Of course it comes as no surprise that Google wants you to send it back for service. What [...]
-
-
12:00
»
Hack a Day
[Gus] made it to the Google+ developers vlog to show off his new Google+ hangout controlled robot. This robot, named OSCAR (Overly Simplified Collaboratively Actuated Robot), drives around according to the whims of everyone in a Google+ hangout. Not only is the robot under remote control through a Google+ hangout, it also features a camera, allowing a [...]
-
-
5:01
»
Hack a Day
Ever wonder what CPU dev boards look like? In the realm of highly confidential hardware, it doesn’t get much more secret than upcoming CPUs coming out of Intel. Somehow, a few CPU dev boards wound up on eBay, and [Leon] was cool enough to save all the pictures (Polish, Google translation, or translate in the sidebar). [...]
-
-
6:00
»
Hack a Day
[Will Powell] sent in his real-time subtitle glasses project. Inspired by the ever cool Google Project Glass, he decided he would experiment with his own version. He used two Raspberry Pi’s running Debian squeeze, vuzix glasses, microphones, a tv, ipad, and iphone as the hardware components. The flow of data is kind of strange in this project. [...]
-
-
17:04
»
Packet Storm Security Exploits
Google Chrome developers, while trying to be adaptive and current, added some windows 8 helper functions to aid the development of Metro style behavior, but does not include the library file itself, thus resulting in an unqualified dynamic-link library call to 'metro_driver.dll'. A user with local disk access can carefully construct a DLL that suits the pattern that is being traversed by the client and implement it somewhere along the search path and the client will load it seamlessly.
-
17:04
»
Packet Storm Security Recent Files
Google Chrome developers, while trying to be adaptive and current, added some windows 8 helper functions to aid the development of Metro style behavior, but does not include the library file itself, thus resulting in an unqualified dynamic-link library call to 'metro_driver.dll'. A user with local disk access can carefully construct a DLL that suits the pattern that is being traversed by the client and implement it somewhere along the search path and the client will load it seamlessly.
-
17:04
»
Packet Storm Security Misc. Files
Google Chrome developers, while trying to be adaptive and current, added some windows 8 helper functions to aid the development of Metro style behavior, but does not include the library file itself, thus resulting in an unqualified dynamic-link library call to 'metro_driver.dll'. A user with local disk access can carefully construct a DLL that suits the pattern that is being traversed by the client and implement it somewhere along the search path and the client will load it seamlessly.
-
-
17:01
»
Hack a Day
Since Google announced the Nexus Q media streaming device at the Google developers conference a few weeks ago, a lot of devs have been toying around with the idea of running Android apps on this small media sphere. [Det] over at BrickSimple threw his hat into the ring with a Pong and/or Breakout app that showcases [...]
-
11:01
»
Hack a Day
I have heard the joke several times that a light saber would make a great bug zapper. However, when [Ricky Sumbody] requested it on Facebook, I thought “why not?”. [Ricky] made a common mistake, he thought the bulb was the part that actually zaps the bugs. A quick google search revealed that many people had [...]
-
7:11
»
Packet Storm Security Exploits
WordPress Google Maps via Store Locator plugin versions 2.7.1 through 3.0.1 suffer from information disclosure, email spoofing, and remote blind SQL injection vulnerabilities.
-
7:11
»
Packet Storm Security Recent Files
WordPress Google Maps via Store Locator plugin versions 2.7.1 through 3.0.1 suffer from information disclosure, email spoofing, and remote blind SQL injection vulnerabilities.
-
7:11
»
Packet Storm Security Misc. Files
WordPress Google Maps via Store Locator plugin versions 2.7.1 through 3.0.1 suffer from information disclosure, email spoofing, and remote blind SQL injection vulnerabilities.
-
6:01
»
Hack a Day
Look at it. Just look at it! This board is a lie. It doesn’t exist (at least not what’s seen in the image here). Instead this is a lifelike rendering made from Eagle CAD files. We’ve already seen that it is rather easy to pull Eagle CAD files into Google SketchUp thanks to the EagleUp [...]
-
-
7:01
»
Hack a Day
[Emanuele] is using Google Docs to log his temperature sensor data automatically (translated). We can see a few benefits gained by using this system. One is that you don’t have to visit the site of the logging hardware to harvest the data, another is that Google will automatically graph the data for you. Of course this [...]
-
-
15:01
»
Hack a Day
[Roy MacDonald] sent in a few links to all the cool stuff his home base – the StgoMakerSpace (Google translation) in Santiago, Chile – is putting together. They’re a new hackerspace that’s only been open for two months or so, but already they’re put together a great assemblage of tools, hosted a few awesome workshops, and even [...]
-
-
14:10
»
Hack a Day
For the lucky few who have a Raspberry Pi board in their hands, you can now use the GPIO pins as a web interface (German, google translation). [Chris] is turning this magical board is turning a small device that can play 1080p video into something that can blink LEDs via the web. The build started with [...]
-
-
7:01
»
Hack a Day
[Shane] is building a new house and wants some, “subtle home automation” as he calls it. His first project is hooking up a small heater to the Internet, and judging from his demo video everything is going swimmingly. [Shane]‘s project is built around an mbed microcontroller that connects to the Internet via an Ethernet connection. The mbed [...]
-
-
12:51
»
Packet Storm Security Advisories
Debian Linux Security Advisory 2454-1 - Multiple vulnerabilities have been found in OpenSSL. Ivan Nestlerode discovered a weakness in the CMS and PKCS #7 implementations that could allow an attacker to decrypt data via a Million Message Attack (MMA). It was discovered that a NULL pointer could be dereferenced when parsing certain S/MIME messages, leading to denial of service. Tavis Ormandy, Google Security Team, discovered a vulnerability in the way DER-encoded ASN.1 data is parsed that can result in a heap overflow.
-
12:51
»
Packet Storm Security Recent Files
Debian Linux Security Advisory 2454-1 - Multiple vulnerabilities have been found in OpenSSL. Ivan Nestlerode discovered a weakness in the CMS and PKCS #7 implementations that could allow an attacker to decrypt data via a Million Message Attack (MMA). It was discovered that a NULL pointer could be dereferenced when parsing certain S/MIME messages, leading to denial of service. Tavis Ormandy, Google Security Team, discovered a vulnerability in the way DER-encoded ASN.1 data is parsed that can result in a heap overflow.
-
12:51
»
Packet Storm Security Misc. Files
Debian Linux Security Advisory 2454-1 - Multiple vulnerabilities have been found in OpenSSL. Ivan Nestlerode discovered a weakness in the CMS and PKCS #7 implementations that could allow an attacker to decrypt data via a Million Message Attack (MMA). It was discovered that a NULL pointer could be dereferenced when parsing certain S/MIME messages, leading to denial of service. Tavis Ormandy, Google Security Team, discovered a vulnerability in the way DER-encoded ASN.1 data is parsed that can result in a heap overflow.
-
15:01
»
Hack a Day
When [Andrea] was looking for a freestyle kayak, he bought the cheap version of a high-end kayak. The hull is exactly the same as the high-end model, but to differentiate between product lines, Pyranha chose to use less expensive fittings. [Andrea] decided to bring his new kayak up to spec (Italian, here’s a Google translation) by [...]
-
0:23
»
Packet Storm Security Advisories
Secunia Security Advisory - A vulnerability has been reported in the Dokodemo Rikunabi 2013 extension for Google Chrome, which can be exploited by malicious people to conduct cross-site scripting attacks.
-
-
17:21
»
Hack a Day
By now we’re assuming you are all familiar with Google’s “Project Glass”, an ambitious augmented reality project for which they revealed a promotional video last week. [Will Powell] saw the promo vid and was so inspired that he attempted to rig up a demo of Project Glass for himself at home. While it might seem [...]
-
-
6:01
»
Hack a Day
With the head-mountable, augmented reality Google Glass capturing tons of attention in the press, it was only a matter of time before we saw a DIY retina projector. This isn’t a new build; [Nirav] has been working on it for a few months, but it might just be time for this information to be useful [...]
-
-
13:01
»
Hack a Day
In case you’ve been living under a rock for the past week, Google announced Project Glass, a real life head-mounted computer that’s actually useful. Glass is one of the projects being developed by Google X, the super-cool R&D department inside Google. On board are [Babak Parviz], [Steve Lee] and [Sebastian Thrun] (a.k.a. the guy you learned AI from [...]
-
12:01
»
Hack a Day
[Dablio] sent in an awesome console mod he made. It may just be the smallest Atari 2600 ever (Portuguese, here’s the Google translation). The build began with a Dynacom MegaBoy, from the same company that put out many less-than-legal 2600 clones. The MegaBoy PCB is an exercise in parsimony consisting of only a single IC, a crystal, and [...]
-
-
23:00
»
Packet Storm Security Advisories
Secunia Security Advisory - Andrea Micalizzi has discovered a security issue in Google Talk, which can be exploited by malicious people to disclose sensitive information.
-
-
8:27
»
Packet Storm Security Recent Files
Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Sign-Sign-On Web Services. This is the whitepaper where researchers discovered eight flaws with SSO technologies in use by major players.
-
8:27
»
Packet Storm Security Misc. Files
Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Sign-Sign-On Web Services. This is the whitepaper where researchers discovered eight flaws with SSO technologies in use by major players.
-
-
22:36
»
SecDocs
Authors:
Felix 'FX' Lindner Tags:
Mac OS X Google iPhone Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: We will discuss the two different approaches Apple and Google take for the client platforms iPad and Chromebook, how they are similar and how they are not. From the security architecture and integrity protection details to your account and identity that links you firmly back to the respective vendor, we will provide the big picture with occasional close-up shots. Here is what powers the vendor has over you, or what powers he gives to arbitrary unwashed attackers at conferences through fails in logic, binary or HTML.
-
22:36
»
SecDocs
Authors:
Felix 'FX' Lindner Tags:
Mac OS X Google iPhone Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: We will discuss the two different approaches Apple and Google take for the client platforms iPad and Chromebook, how they are similar and how they are not. From the security architecture and integrity protection details to your account and identity that links you firmly back to the respective vendor, we will provide the big picture with occasional close-up shots. Here is what powers the vendor has over you, or what powers he gives to arbitrary unwashed attackers at conferences through fails in logic, binary or HTML.
-
-
17:01
»
Packet Storm Security Recent Files
darkb0t is an IRC bot written in Python that is capable of doing reverse DNS lookups, google dork searching, performing link checking on SQL injection, and more.
-
17:01
»
Packet Storm Security Misc. Files
darkb0t is an IRC bot written in Python that is capable of doing reverse DNS lookups, google dork searching, performing link checking on SQL injection, and more.