Skip to main content

Google Admits to a Security Flaw Affecting 1.5 Billion of Users

 Google has finally admitted to vulnerability that has security repercussions for nearly 1.5 billion of its users. This security flaw was brought to the notice of Google two years ago by researchers at Black Hills Information Security. These researchers had claimed that vulnerability in Google Calendar app was enough for hackers to allow hackers to steal information from he computers of users of Gmail around the country. It is only now that Gmail support number is acknowledging the existence of this security flaw.

Google did not take any steps to fix this security flaw back in 2017 as it would have resulted in drop in functionality for the users of its Google Calendar app. This was despite the fact that these researchers demonstrated how this vulnerability could be exploited as a weapon by hackers to steal information from the computers of users of Gmail. At that time, Google said that its policy was to prevent spread of malicious content on the services offered by the company. But it is only now after 2 years that Google is taking concrete action on this security problem affecting billions of its users.

Google Calendar is an app that can be used by anyone to schedule a meeting with anyone else using Gmail. Google has built seamless integration with Google Calendar. Taking advantage of this integration, a hacker can send calendar invitation to another individual. He gets a notification that pops up on his mobile phone. Sender can easily include a malicious link in his message which could be anything from a poll providing financial incentive or an online poll with the participant required to provide his bank or credit card details. This security flaw opens up endless possibilities of phishing and social engineering attacks. If you are still unaware of how these attacks work, you can contact Gmail support number to learn more about them.

Now, 2 years later, Google has finally acknowledged that it is aware of the spam taking place in Google Calendar. It has also confirmed that the company is working diligently to resolve the security flaw. It is clear to everyone that close linking of Gmail and Google Calendar by Google inadvertently created a space for people with malicious intentions. Anyone can send a Calendar invitation to another person whether he knows him or not provided both are users of Gmail.

If anyone tries to take advantage of this vulnerability, he can easily send a fake invitation to another individual which would be likely to be clicked by innocent and gullible users.

As Google is yet to take any measure to prevent this possibility of phishing, you are still vulnerable to attacks from hackers. It is prudent for you to contact any reliable Gmail support service to learn a method to keep such Google Calendar invites at bay. The most basic method is to go to Calendar settings and then Event Settings. Now click on Automatically Add Invitations and choose the option of No to make sure you never get such calendar invitations.

more information: aim mail

Comments

Post a Comment

Popular posts from this blog

Malwarebytes Slams Apple for the Poor Quality Patching Process

 Malwarebytes has emerged as one of the most popular antivirus systems around the world in recent times. This is when Malwarebytes does not fulfill the requirements to be labeled as fully-fledged antivirus. Recently, the company surprised everyone by complaining against Apple, one of the biggest tech companies in the world. In a blog post written by  Malwarebytes support , the company criticized the patching process of Apple saying it can have serious repercussions for the safety and security of the systems being used by the customers. Thomas Reid, Mac and mobile director in Malwarebytes, wrote a blog post that centers on a campaign called Watering Hole being run in Hong Kong. Watering Hole is actually a security threat that was aimed at the users of Mac OS who were directing people to a pro-democracy event supported by a political organization. TAG from Google first reported about Watering Hole some time ago. Hackers made use of two vulnerabilities in the Mac OS to launch these attac

Avg Browser Extensions Caught Spying on User’s Behavior

 AVG antivirus free version is the most popular software used by people to safeguard their safety against online threats. Users are asked to install some browser extensions when setting up the program on their computers. Recently, Mozilla has removed some browser extensions being offered by Avast and AVG antivirus programs. This was done as there were reports that these extensions were spying on the browsing behaviors of the customers and gathering this data.  AVG customer care  is not confirming these reports as of now. The extensions that have been blamed for snooping on browsing history of users are AVG SafePrice, AVG Online Security, Avast SafePrice, and Avast Online Security. If you are not aware, Online Security extension claims to protect the user by disallowing visit to a malicious website. On the other hand, SafePrice browser extension says it works to apprise the user about websites where it can get higher discounts and better deals. It appears that both these browser extens

Malwarebytes Premium Support: Multiple Layers of Protection

 In times not so long ago, antivirus products were of a simple nature and they provided protection to the system against viruses of all kinds. In those days, viruses were easy to be detected. Today, there are multiple threats that take on different forms like ransomware, malware, rootkits, Trojans, and so on, making it difficult for any antivirus to identify and destroy all these threats. Malwarebytes Premium 4.0 carries out behavior based analysis in addition to providing other layers of protection to the user. Malwarebytes premium support  costs just $39.99 per annum and by paying $79.99, you can get this support on up to 5 of your devices. The dashboard tells you that your system is protected when everything is all right. It also tells you the details of the last scan. On the right side of the dashboard are the toggles that work as controls for 4 layered security provided by the program. If you click on the scan button on the middle panel, Malwarebytes Premium 4 begins a scan of you