Skip to main content

Google Admits to a Security Flaw Affecting 1.5 Billion of Users

 Google has finally admitted to vulnerability that has security repercussions for nearly 1.5 billion of its users. This security flaw was brought to the notice of Google two years ago by researchers at Black Hills Information Security. These researchers had claimed that vulnerability in Google Calendar app was enough for hackers to allow hackers to steal information from he computers of users of Gmail around the country. It is only now that Gmail support number is acknowledging the existence of this security flaw.

Google did not take any steps to fix this security flaw back in 2017 as it would have resulted in drop in functionality for the users of its Google Calendar app. This was despite the fact that these researchers demonstrated how this vulnerability could be exploited as a weapon by hackers to steal information from the computers of users of Gmail. At that time, Google said that its policy was to prevent spread of malicious content on the services offered by the company. But it is only now after 2 years that Google is taking concrete action on this security problem affecting billions of its users.

Google Calendar is an app that can be used by anyone to schedule a meeting with anyone else using Gmail. Google has built seamless integration with Google Calendar. Taking advantage of this integration, a hacker can send calendar invitation to another individual. He gets a notification that pops up on his mobile phone. Sender can easily include a malicious link in his message which could be anything from a poll providing financial incentive or an online poll with the participant required to provide his bank or credit card details. This security flaw opens up endless possibilities of phishing and social engineering attacks. If you are still unaware of how these attacks work, you can contact Gmail support number to learn more about them.

Now, 2 years later, Google has finally acknowledged that it is aware of the spam taking place in Google Calendar. It has also confirmed that the company is working diligently to resolve the security flaw. It is clear to everyone that close linking of Gmail and Google Calendar by Google inadvertently created a space for people with malicious intentions. Anyone can send a Calendar invitation to another person whether he knows him or not provided both are users of Gmail.

If anyone tries to take advantage of this vulnerability, he can easily send a fake invitation to another individual which would be likely to be clicked by innocent and gullible users.

As Google is yet to take any measure to prevent this possibility of phishing, you are still vulnerable to attacks from hackers. It is prudent for you to contact any reliable Gmail support service to learn a method to keep such Google Calendar invites at bay. The most basic method is to go to Calendar settings and then Event Settings. Now click on Automatically Add Invitations and choose the option of No to make sure you never get such calendar invitations.

more information: aim mail

Comments

Post a Comment

Popular posts from this blog

Malwarebytes Slams Apple for the Poor Quality Patching Process

 Malwarebytes has emerged as one of the most popular antivirus systems around the world in recent times. This is when Malwarebytes does not fulfill the requirements to be labeled as fully-fledged antivirus. Recently, the company surprised everyone by complaining against Apple, one of the biggest tech companies in the world. In a blog post written by  Malwarebytes support , the company criticized the patching process of Apple saying it can have serious repercussions for the safety and security of the systems being used by the customers. Thomas Reid, Mac and mobile director in Malwarebytes, wrote a blog post that centers on a campaign called Watering Hole being run in Hong Kong. Watering Hole is actually a security threat that was aimed at the users of Mac OS who were directing people to a pro-democracy event supported by a political organization. TAG from Google first reported about Watering Hole some time ago. Hackers made use of two vulnerabilities in the Mac OS to launch th...

Netflix to Go Tough on Password Sharing

A lot of Netflix consumers have reported receiving a message from the company on their screens saying they need their own account to continue watching Netflix if they do not live with the account owner. The company was getting information that more than 20% of its consumers were sharing their account passwords with friends to allow them to watch Netflix illegally. Realizing this practice cost Netflix a massive amount of money,  Netflix support  has decided to go tough on this habit of password sharing by its customers. A spokesperson of Netflix confirmed sending such messages to customers when talking with the BBC. He added that the basic aim of the company behind sending these messages is to make sure that only authorized customers are using their accounts. The spokesperson also said that this message was not being sent to all the customers and a decision in this regard will be taken soon by the company. The problem of password sharing stems from the fact that streaming compa...

Vulnerability Issues Found in All Mcafee Antivirus Products

 McAfee antivirus is regarded as one of the most effective internet security suites and used by millions of individuals in their computers. However, researchers have found a security big in all editions of McAfee antivirus that can be used by hackers to harm the systems of the victims. The fact that no denial has come forward from  McAfee antivirus support  team confirms the serious nature of this security bug. Cyber security team of researchers at SafeBreah Labs shocked the world on Tuesday when it said that defense mechanisms of McAfee antivirus products can be bypassed by a security bug called CVE-2019-3648. Once the system’s security has been compromised, it becomes easy for hackers to carry out further attacks to take control of the system. Realizing the gravity of the situation, developers at McAfee swung into action and released a patch to fix this security bug. This security flaw was brought to the notice of researchers at McAfee in August 2019. It was clear that...