Search the Community: Showing results for tags 'Google'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ChainScriptz
    • News
    • Site Updates
    • Add Links
    • Feedback and Comments
  • Miscellaneous
    • Welcome Intro
    • Jokes
    • Chit Chat
    • Radio Stations
    • Hot Picks
    • Test Forum
  • IRC Help and News
    • Scripting Help
    • IRCd Snippets
    • IRCd Chat
    • Chat Networks
    • Eggdrop
    • Script Reviews
    • mIRC Chat
    • IRC Servers & Rooms
    • mIRC Tutorials
    • IRC Clients
  • Tutorials
    • IRC Network Tutorials
    • IRC Client Tutorials
  • Coding Corner
    • WebSite Corner
  • Archives
    • MSN Chat
    • Defunct Chat Networks
    • Gallery
  • Sparkpea
  • Oasiz Chat
  • Phreik Chat
  • Icons & Toolbars
  • Koach.com
  • MTS Themes
  • MSN Old Scriptz
  • New Downloads
  • Support Files & DLL's
  • Vibe SN
  • Maztal
  • Slovenain Scriptz
  • Italian Scriptz
  • Turkish IRC Scriptz
  • Greek Scriptz
  • Script Support Files & DLL's
  • Groups
  • Security Software - Daily Updates
  • Security Programs - Updates
  • General Software - Updates
  • Other Operating Systems - Updates
  • Social Networks
  • Software Reviews
  • Security News and Alerts
  • Virus, Spyware and Trojan Removal
  • Security Bulletins

Categories

  • Info Addons
  • Buzzen
    • Buzzen Addons
    • Buzzen Archives
  • Sparkpea (ircwx)
    • Sparkpea Scripts (ircwx)
    • Sparkpea Connections (ircwx)
  • Scriptz(IRC)
    • Addons
    • War Scriptz
  • International Scripts(IRC)
    • Greek IRC Scriptz
    • Italian Scriptz
    • Slovenain Scriptz
    • Turkish IRC Scriptz
    • Swedish Scripts
    • Russian Scriptz
    • French Scriptz
  • TCN
  • essential chat
  • Net4110
  • Script Support Files & DLL's
  • IRC Administration Resources
  • IRCd's
  • Server Clients
  • Phoenix Chat
  • Scripting Essentials
  • Phreik Chat
    • Addons
    • Games
  • MSN Archive Scripts
    • MSN Addons
  • Sparkpea Scripts
    • Sparkpea Connections
    • Sparkpea Addons
    • Sparkpea Vincula Scripts
    • sparkpea Trivia & Game scripts
  • Tutorials
  • EggDrop
    • Anti-Spam Scripts
    • Info Scripts
  • Dlls

Calendars

  • Community Calendar

Found 5 results

  1. The first home delivery drone service has been launched in Australia, after years of test flights. Wing, owned by Google's parent company Alphabet, will deliver takeaway food, coffee and medicines by drone to about 100 homes in Canberra. It has been testing its drones in Australia since 2014 but many residents had complained about the noise. Wing said the feedback obtained during its trials had been "valuable" and it hoped to "continue the dialogue". Australia's aviation authority gave Wing permission to launch a commercial service after examining its safety record and operational plans. It judged that the company posed no risk to residents or other aircraft. Image copyrightWINGImage captionWing deliveries are lowered on stringWing's drones deliver small packages which are lowered into the customer's garden on a length of string. However, the approval has several conditions attached. The drones will only be allowed to fly during the day and not before 08:00 AEST at the weekend. They will not be allowed to fly over crowds or main roads. Skip Youtube post by Mack and Marty MonkeyWarning: Third party content may contain advertsReportEnd of Youtube post by Mack and Marty Monkey Trials of the drones had attracted complaints from residents in Bonython, Canberra, who said they were noisy and intrusive. The Bonython Against Drones campaign said the devices could be heard from "a long way off, both coming and leaving". "When they do a delivery drop they hover over the site and it sounds like an extremely loud, squealing vacuum cleaner," the group said on its website. In response, Wing said it had developed a quieter drone. The aviation authority says Wing must use this quieter drone for its commercial service.
  2. Google revealed that it took down 2.3 billion bad ads in 2018, including 58.8 million phishing ads for violation of its policies. Google introduced 31 new ads policies in 2018, aiming at protecting users from scams and other fraudulent activities (i.e. third-party tech support, ticket resellers, and crypto-currency). Some of the policies added by Google in 2018 include the ban of ads from for-profit bail bond providers that were abused for taking advantage of vulnerable communities. “In all, we introduced 31 new ads policies in 2018 to address abuses in areas including third-partytech support, ticket resellers, cryptocurrency and local services such as garage door repairmen, bail bonds and addiction treatment facilities.” reads the press release published by Google. “We took down 2.3 billion bad ads in 2018 for violations of both new and existing policies, including nearly 207,000 ads for ticket resellers, over 531,000 ads for bail bonds and approximately 58.8 million phishing ads. Overall, that’s more than six million bad ads, every day.” Malicious ads that Google took down in 2018 include nearly 207,000 ads for ticket resellers and over 531,000 ads for bail bonds. Google announced it will launch next month a new policy manager in Google Ads that will give tips to advertisers to avoid common policy mistakes. Google also revealed it was able to identify threat actors behind bad ads with the help of improved machine learning technology, it terminated nearly one million bad advertiser accounts. “When we take action at the account level, it helps to address the root cause of bad ads and better protect our users,” continues Google. In 2017, Google launched new technology for more granular analysis of ads, one year later the company launched 330 detection classifiers to help us better detect “badness” at the page level (nearly three times the number of classifiers launched in 2017 by the tech giant). “So while we terminated nearly 734,000 publishers and app developers from our ad network, and removed ads completely from nearly 1.5 million apps, we were also able to take more granular action by taking ads off of nearly 28 million pages” Google adds. Last year, Google introduced a new policy specifically created for election ads in the U.S. ahead of the 2018 midterm elections. The company aimed at preventing misinformation and fake news, it verified nearly 143,000 election ads, similar tools are being launched ahead of elections in the EU and India. Google removed ads from approximately 1.2 million pages, more than 22,000 apps, and nearly 15,000 sites last year. Ads from almost 74,000 pages were removed for violating their “dangerous or derogatory” content policy. 190,000 ads were taken down for violating this policy. In 2018, Google helped the FBI, along with the cyber-security firm White Ops, to take down a sophisticated ad fraud scheme called ‘3ve’ that allowed its operators to earn tens of millions of dollars. 3ve infected over 1.7 million computers to carry out advertising frauds. https://securityaffairs.co/wordpress/82519/cyber-crime/bad-ads-google.html
  3. Revised proposals attempt to address worries over Manifest v3 API changes. Google has proposed changes to its Chrome Extension renovation plan that answer some but not all of the concerns its Manifest v3 technical specification. The initial changes, announced in October last year, set off alarm bells last month when a critical mass of Chrome plugin developers finally realized what Google intended. The Manifest v3 changes represent an attempt to address real issues for users of the Chrome browser, specifically the security and performance implications of third-party code that has access to sensitive data. But the fixes Google initially suggested have broad implications. The Manifest v3 specification would break content and ad blockers, privacy extensions, and a host of other browser add-on code that relies on the ability to intercept requested web content before it gets rendered in the browser. Much of the angst arises from planned changes to the webRequest API, through which Chrome extensions handle incoming web content; Google wants to limit the API and replace it with a neutered version, the declarativeNetRequest API. The trouble is that as initially outlined, declarativeNetRequest is far too limited to accommodate current use cases. If implemented, existing extensions like uBlock Origin will have to be rewritten and won't have the same functionality regardless. Other technical changes have been floated that represent potential problems for existing code, like changes to background pages, but declarativeNetRequest represents the major sticking point. On Friday, Google software engineer Devlin Cronin published an update on Google's plans, insisting that there's too much abuse to maintain the status quo. "Users need to have greater control over the data their extensions can access," he wrote in a message posted to the Chromium Extensions discussion group. At the same time, he reiterated Google's interest in input from the developer community and offered evidence that Google is listening by outlining a less awful version of the declarativeNetRequest API. The tweaked spec will include support for dynamic rules – which content blockers formulate based on incoming content rather than declaring them ahead of time. "We agree that this is valuable in creating sophisticated content blocking extensions, and will be adding support for declarative rules that can be added or removed at runtime to the declarativeNetRequest API," Cronin said. The API will also be able to handle more than 30,000 rules, though how many isn't clear. Cronin insists the number cannot be unbounded to ensure adequate performance. And it will include expanded matching capabilities – necessary for effective filtering – and some request modification capabilities, like the ability to strip cookies. "We are also investigating other conditions and actions that may make sense to add, such as matching based on top-level domain," said Cronin. Other potential issues, like the difficulty of using ServiceWorkers as a replacement for persistent background pages to handle resource-intensive background processes like decryption and DOM parsing, are also being evaluated. "We won’t launch Manifest V3 until it is ready, and there will be a migration period in which we can continue to address feedback and issues," said Cronin. "We will not remove support for Manifest V2 until we are confident in the platform.nge By Thomas Claburn in San Francisco 16 Feb 2019 at 01:48
  4. Update (Feb 6): We have updated the post to clarify a protocol used in the design is centered around private set intersection.Google helps keep your account safe from hijacking with a defense in depth strategy that spans prevention, detection, and mitigation. As part of this, we regularly reset the passwords of Google accounts affected by third-party data breaches in the event of password reuse. This strategy has helped us protect over 110 million users in the last two years alone. Without these safety measures, users would be at ten times the risk of account hijacking.We want to help you stay safe not just on Google, but elsewhere on the web as well. This is where the new Password Checkup Chrome extension can help. Whenever you sign in to a site, Password Checkup will trigger a warning if the username and password you use is one of over 4 billion credentials that Google knows to be unsafe.Password Checkup was designed jointly with cryptography experts at Stanford University to ensure that Google never learns your username or password, and that any breach data stays safe from wider exposure. Since Password Checkup is an early experiment, we’re sharing the technical details behind our privacy preserving protocol to be transparent about how we keep your data secure. https://security.googleblog.com/2019/02/protect-your-accounts-from-data.html
  5. During its incessant web crawling, Google's search engine constantly encounters credentials dumped by hackers or left exposed by the careless. And because it can, the ad confectionery copies and encrypts these spilled usernames and passwords. Armed with this info, the Chocolate Factory directed its software engineers, in conjunction with crypto boffins from Stanford University, to create a Chrome browser extension called Password Checkup that allows Chrome users to check to see whether their passwords can be found online. The hope is that users thus warned will get the hint and change the compromised secret. Mozilla's rival browser Firefox implemented a similar service last year called Firefox Monitor that checks a third-party database of exposed credentials called HaveIBeenPwned.com. Users of password management app 1Password also have access to an extension that checks stored credentials against exposed ones using the same service. Google's Password Checkup extension takes a similar approach with its internal dataset of 4bn identifiers. Your password is safe - trust usMembers of Google's security and anti-abuse research team – Jennifer Pullman, Kurt Thomas, and Elie Bursztein – claim that "Google never learns your username or password" even through it collects the data. "At a high level, Password Checkup needs to query Google about the breach status of a username and password without revealing the information queried," the trio explain in a blog post today. "At the same time, we need to ensure that no information about other unsafe usernames or passwords leaks in the process, and that brute force guessing is not an option." The company's supposed ignorance of these secrets arises from repeated hashing and privacy techniques like single-party private information retrieval (PIR) and 1-out-of-N oblivious transfer. https://www.theregister.co.uk/2019/02/05/google_leaked_passwords_chrome_extension/