Security News




2015-07-06 20:32
Google has pulled a malicious click fraud app from Google Play that spoofs the popular BatteryBot Pro app.






2015-06-22 16:05
Google has fixed several vulnerabilities in Chrome, including a pair of cross-origin bypasses and a high-risk scheme validation error.