Security News

USB gizmo biz apologies amid infosec drama Yubico has apologized to a security vulnerability researcher who had complained the dongle peddler lifted his work to nab a $5,000 Google bug bounty.…

The devices don’t require authentication for connections received on a local network; and, HTTP is used to configure or control embedded devices.

A newly added “Endpoint Verification” feature in G Suite provides administrators with increased visibility into the computers that have access to corporate data. read more

Google in the coming weeks is expected to fix a location privacy leak in two of its most popular consumer products. New research shows that Web sites can run a simple script in the background that...

Don't want to deal with targeted ads? Here's how to limit your shared personal data in Google.

Time's up for Chrome extensions from third-party sites.

Google is changing how Chrome users find and install extensions, says TechRepublic's Brandon Vigliarolo.

Google is killing off extension installation anywhere outside official sources: Soon you'll only be able to get them from the Chrome Web Store.

Google this week detailed plans to completely remove the inline installation of Chrome extensions from its web browser by the end of the year. read more

Google is shutting down an often used vector for delivering malicious Chrome extensions to users by removing the inline installation option. What will happen? The announcement was made by...