<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Google Data &#187; Jay</title>
	<atom:link href="/author/jay/feed/" rel="self" type="application/rss+xml" />
	<link>https://googledata.org</link>
	<description>Everything Google: News, Products, Services, Content, Culture</description>
	<lastBuildDate>Thu, 19 Mar 2015 12:00:08 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.7.5</generator>
	<item>
		<title>Security rewards at Google: Two MEEELLION Dollars Later</title>
		<link>https://googledata.org/google-online-security/security-rewards-at-google-two-meeellion-dollars-later/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=security-rewards-at-google-two-meeellion-dollars-later</link>
		<comments>https://googledata.org/google-online-security/security-rewards-at-google-two-meeellion-dollars-later/#comments</comments>
		<pubDate>Mon, 12 Aug 2013 19:55:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=9f36f9e7bade5cc54b1209d01c74f875</guid>
		<description><![CDATA[<span>Posted by Chris Evans and Adam Mein, Masters of Coin</span><br /><br />One of Google&#8217;s core security principles is to engage the community, to better protect our users and build relationships with security researchers. We had this principle in mind as we launched our <a href="http://blog.chromium.org/2010/01/encouraging-more-chromium-security.html">Chromium</a> and <a href="http://googleonlinesecurity.blogspot.com/2010/11/rewarding-web-application-security.html">Google Web</a> Vulnerability Reward Programs. We didn&#8217;t know what to expect, but in the three years since launch, we&#8217;ve rewarded (and fixed!) more than 2,000 security bug reports and also received recognition for setting <a href="http://www.cs.berkeley.edu/~devdatta/papers/vrp-paper.pdf">leading standards for response time</a>.<br /><br />The collective creativity of the wider security community has surpassed all expectations, and their expertise has helped make Chrome even safer for hundreds of millions of users around the world. Today we&#8217;re delighted to announce we&#8217;ve now paid out in excess of $2,000,000 (USD) across Google&#8217;s security reward initiatives. Broken down, this total includes more than $1,000,000 (USD) for the <a href="https://sites.google.com/a/chromium.org/dev/Home/chromium-security/hall-of-fame">Chromium VRP</a> / <a href="http://blog.chromium.org/2012/02/pwnium-rewards-for-exploits.html">Pwnium</a> rewards, and in excess of $1,000,000 (USD) for the <a href="https://www.google.com/about/appsecurity/hall-of-fame/reward/">Google Web VRP</a> rewards.<br /><br />Today, the Chromium program is raising reward levels significantly. In a nutshell, bugs previously rewarded at the $1,000 level will now be considered for reward at up to $5,000. In many cases, this will be a 5x increase in reward level! We&#8217;ll issue higher rewards for bugs we believe present a more significant threat to user safety, and when the researcher provides an accurate analysis of exploitability and severity. We will continue to pay <a href="http://blog.chromium.org/2012/08/chromium-vulnerability-rewards-program.html">previously announced bonuses</a> on top, such as those for <a href="https://code.google.com/p/chromium/issues/detail?id=74991">providing a patch</a> or finding an issue in a critical piece of open source software.<br /><br />Interested Chromium researchers should familiarize themselves with our documentation on <a href="http://www.chromium.org/Home/chromium-security/reporting-security-bugs">how to report a security bug well</a> and <a href="http://www.chromium.org/Home/chromium-security/vulnerability-rewards-program/reward-nomination-process">how we determine higher reward eligibility</a>.<br /><br />These Chromium reward level increases follow on from similar <a href="http://googleonlinesecurity.blogspot.com/2013/06/increased-rewards-for-googles-web.html">increases under the Google Web program</a>. With all these new levels, we&#8217;re excited to march towards new milestones and a more secure web.<br /><br /><br /><br /><br /><br />]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Chris Evans and Adam Mein, Masters of Coin</span><br /><br />One of Google’s core security principles is to engage the community, to better protect our users and build relationships with security researchers. We had this principle in mind as we launched our <a href="http://blog.chromium.org/2010/01/encouraging-more-chromium-security.html">Chromium</a> and <a href="http://googleonlinesecurity.blogspot.com/2010/11/rewarding-web-application-security.html">Google Web</a> Vulnerability Reward Programs. We didn’t know what to expect, but in the three years since launch, we’ve rewarded (and fixed!) more than 2,000 security bug reports and also received recognition for setting <a href="http://www.cs.berkeley.edu/~devdatta/papers/vrp-paper.pdf">leading standards for response time</a>.<br /><br />The collective creativity of the wider security community has surpassed all expectations, and their expertise has helped make Chrome even safer for hundreds of millions of users around the world. Today we’re delighted to announce we’ve now paid out in excess of $2,000,000 (USD) across Google’s security reward initiatives. Broken down, this total includes more than $1,000,000 (USD) for the <a href="https://sites.google.com/a/chromium.org/dev/Home/chromium-security/hall-of-fame">Chromium VRP</a> / <a href="http://blog.chromium.org/2012/02/pwnium-rewards-for-exploits.html">Pwnium</a> rewards, and in excess of $1,000,000 (USD) for the <a href="https://www.google.com/about/appsecurity/hall-of-fame/reward/">Google Web VRP</a> rewards.<br /><br />Today, the Chromium program is raising reward levels significantly. In a nutshell, bugs previously rewarded at the $1,000 level will now be considered for reward at up to $5,000. In many cases, this will be a 5x increase in reward level! We’ll issue higher rewards for bugs we believe present a more significant threat to user safety, and when the researcher provides an accurate analysis of exploitability and severity. We will continue to pay <a href="http://blog.chromium.org/2012/08/chromium-vulnerability-rewards-program.html">previously announced bonuses</a> on top, such as those for <a href="https://code.google.com/p/chromium/issues/detail?id=74991">providing a patch</a> or finding an issue in a critical piece of open source software.<br /><br />Interested Chromium researchers should familiarize themselves with our documentation on <a href="http://www.chromium.org/Home/chromium-security/reporting-security-bugs">how to report a security bug well</a> and <a href="http://www.chromium.org/Home/chromium-security/vulnerability-rewards-program/reward-nomination-process">how we determine higher reward eligibility</a>.<br /><br />These Chromium reward level increases follow on from similar <a href="http://googleonlinesecurity.blogspot.com/2013/06/increased-rewards-for-googles-web.html">increases under the Google Web program</a>. With all these new levels, we’re excited to march towards new milestones and a more secure web.<br /><br /><br /><br /><br /><br />]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/security-rewards-at-google-two-meeellion-dollars-later/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Transparency Report: Making the web a safer place</title>
		<link>https://googledata.org/uncategorized/transparency-report-making-the-web-a-safer-place-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=transparency-report-making-the-web-a-safer-place-2</link>
		<comments>https://googledata.org/uncategorized/transparency-report-making-the-web-a-safer-place-2/#comments</comments>
		<pubDate>Tue, 25 Jun 2013 15:08:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=14567c7b25890fb489580810506cd251</guid>
		<description><![CDATA[<span>Posted by Lucas Ballard, Software Engineer</span><br /><br /><i>[Cross-posted from the <a href="http://googleblog.blogspot.com/2013/06/transparency-report-making-web-safer.html">Official Google Blog</a>]</i><br /><br />Two of the biggest threats online are malicious software (known as malware) that can take control of your computer, and phishing scams that try to trick you into sharing passwords or other private information.<br /><br />So in 2006 we started a <a href="http://googleonlinesecurity.blogspot.com/2012/06/safe-browsing-protecting-web-users-for.html">Safe Browsing program</a> to find and flag suspect websites. This means that when you are surfing the web, we can now warn you when a site is unsafe. We're currently flagging up to 10,000 sites a day&#8212;and because we share this technology with other browsers there are about 1 billion users we can help keep safe.<br /><br />But we're always looking for new ways to protect users' security. So today we're launching a new section on our <a href="http://www.google.com/transparencyreport/">Transparency Report</a> that will shed more light on the sources of malware and phishing attacks.  You can now learn how many people see Safe Browsing warnings each week, where malicious sites are hosted around the world, how quickly websites become reinfected after their owners clean malware from their sites, and other tidbits we&#8217;ve surfaced.<br /><br /><div><a href="http://4.bp.blogspot.com/-Q8XH2l1wkzc/Ucmmfj4lgEI/AAAAAAAAMl8/ItCsmQH-mbE/s1600/Screenshot+2013-06-24+at+6.41.13+AM.png"><img border="0" src="http://4.bp.blogspot.com/-Q8XH2l1wkzc/Ucmmfj4lgEI/AAAAAAAAMl8/ItCsmQH-mbE/s500/Screenshot+2013-06-24+at+6.41.13+AM.png" width="500"></a></div><br />Sharing this information also aligns well with our Transparency Report, which already gives information about government requests for user data, government requests to remove content, and current disruptions to our services.<br /><br />To learn more, explore the new Safe Browsing information on <a href="http://www.google.com/transparencyreport/safebrowsing">this page</a>. Webmasters and network administrators can find recommendations for dealing with malware infections, including resources like <a href="http://www.google.com/webmasters/tools/">Google Webmaster Tools</a> and <a href="http://www.google.com/safebrowsing/alerts/">Safe Browsing Alerts for Network Administrators</a>.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Lucas Ballard, Software Engineer</span><br /><br /><i>[Cross-posted from the <a href="http://googleblog.blogspot.com/2013/06/transparency-report-making-web-safer.html">Official Google Blog</a>]</i><br /><br />Two of the biggest threats online are malicious software (known as malware) that can take control of your computer, and phishing scams that try to trick you into sharing passwords or other private information.<br /><br />So in 2006 we started a <a href="http://googleonlinesecurity.blogspot.com/2012/06/safe-browsing-protecting-web-users-for.html">Safe Browsing program</a> to find and flag suspect websites. This means that when you are surfing the web, we can now warn you when a site is unsafe. We're currently flagging up to 10,000 sites a day—and because we share this technology with other browsers there are about 1 billion users we can help keep safe.<br /><br />But we're always looking for new ways to protect users' security. So today we're launching a new section on our <a href="http://www.google.com/transparencyreport/">Transparency Report</a> that will shed more light on the sources of malware and phishing attacks.  You can now learn how many people see Safe Browsing warnings each week, where malicious sites are hosted around the world, how quickly websites become reinfected after their owners clean malware from their sites, and other tidbits we’ve surfaced.<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://4.bp.blogspot.com/-Q8XH2l1wkzc/Ucmmfj4lgEI/AAAAAAAAMl8/ItCsmQH-mbE/s1600/Screenshot+2013-06-24+at+6.41.13+AM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-Q8XH2l1wkzc/Ucmmfj4lgEI/AAAAAAAAMl8/ItCsmQH-mbE/s500/Screenshot+2013-06-24+at+6.41.13+AM.png" width="500" /></a></div><br />Sharing this information also aligns well with our Transparency Report, which already gives information about government requests for user data, government requests to remove content, and current disruptions to our services.<br /><br />To learn more, explore the new Safe Browsing information on <a href="http://www.google.com/transparencyreport/safebrowsing">this page</a>. Webmasters and network administrators can find recommendations for dealing with malware infections, including resources like <a href="http://www.google.com/webmasters/tools/">Google Webmaster Tools</a> and <a href="http://www.google.com/safebrowsing/alerts/">Safe Browsing Alerts for Network Administrators</a>.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/transparency-report-making-the-web-a-safer-place-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Iranian phishing on the rise as elections approach</title>
		<link>https://googledata.org/uncategorized/iranian-phishing-on-the-rise-as-elections-approach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=iranian-phishing-on-the-rise-as-elections-approach</link>
		<comments>https://googledata.org/uncategorized/iranian-phishing-on-the-rise-as-elections-approach/#comments</comments>
		<pubDate>Wed, 12 Jun 2013 22:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=74b83b417575f99b05d148cf494fb603</guid>
		<description><![CDATA[<span>Posted by Eric Grosse, VP Security Engineering</span><br /><br /><i>[Update June 13: This post is available in Farsi on the <a href="http://googlepersianblog.blogspot.com/2013/06/blog-post.html">Google Persian Blog</a>.]</i><br /><br />For almost three weeks, we have detected and disrupted multiple email-based phishing campaigns aimed at compromising the accounts owned by tens of thousands of Iranian users. These campaigns, which originate from within Iran, represent a significant jump in the overall volume of phishing activity in the region. The timing and targeting of the campaigns suggest that the attacks are politically motivated in connection with the Iranian presidential election on Friday.<br /><br /><div><a href="http://2.bp.blogspot.com/-PYvRXllnKMM/UbjtA0uvi6I/AAAAAAAAFlI/jEyaVEHW-4c/s1600/blog.png"><img border="0" height="245" src="http://2.bp.blogspot.com/-PYvRXllnKMM/UbjtA0uvi6I/AAAAAAAAFlI/jEyaVEHW-4c/s320/blog.png" width="320"></a></div><br />Our Chrome browser previously helped detect what appears to be the same group using SSL certificates to conduct attacks that <a href="http://googleonlinesecurity.blogspot.com/2011/09/gmail-account-security-in-iran.html">targeted users within Iran</a>. In this case, the phishing technique we detected is more routine: users receive an email containing a link to a web page that purports to provide a way to perform account maintenance. If the user clicks the link, they see a fake Google sign-in page that will steal their username and password.<br /><br />Protecting our users&#8217; accounts is one of our top priorities, so we notify targets of <a href="http://googleonlinesecurity.blogspot.com/2012/06/security-warnings-for-suspected-state.html">state-sponsored attacks</a> and other <a href="http://googleonlinesecurity.blogspot.com/2010/03/detecting-suspicious-account-activity.html">suspicious activity</a>, and we take other appropriate actions to limit the impact of these attacks on our users. Especially if you are in Iran, we encourage you to <a href="https://support.google.com/mail/answer/2591015">take extra steps to protect your account</a>. Watching out for phishing, using a modern browser like Chrome and <a href="http://google.com/2step">enabling 2-step verification</a> can make you significantly more secure against these and many other types of attacks. Also, before typing your Google password, always verify that the URL in the address bar of your browser begins with https://accounts.google.com/. If the website's address does not match this text, please don&#8217;t enter your Google password.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Eric Grosse, VP Security Engineering</span><br /><br /><i>[Update June 13: This post is available in Farsi on the <a href="http://googlepersianblog.blogspot.com/2013/06/blog-post.html">Google Persian Blog</a>.]</i><br /><br />For almost three weeks, we have detected and disrupted multiple email-based phishing campaigns aimed at compromising the accounts owned by tens of thousands of Iranian users. These campaigns, which originate from within Iran, represent a significant jump in the overall volume of phishing activity in the region. The timing and targeting of the campaigns suggest that the attacks are politically motivated in connection with the Iranian presidential election on Friday.<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-PYvRXllnKMM/UbjtA0uvi6I/AAAAAAAAFlI/jEyaVEHW-4c/s1600/blog.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="245" src="http://2.bp.blogspot.com/-PYvRXllnKMM/UbjtA0uvi6I/AAAAAAAAFlI/jEyaVEHW-4c/s320/blog.png" width="320" /></a></div><br />Our Chrome browser previously helped detect what appears to be the same group using SSL certificates to conduct attacks that <a href="http://googleonlinesecurity.blogspot.com/2011/09/gmail-account-security-in-iran.html">targeted users within Iran</a>. In this case, the phishing technique we detected is more routine: users receive an email containing a link to a web page that purports to provide a way to perform account maintenance. If the user clicks the link, they see a fake Google sign-in page that will steal their username and password.<br /><br />Protecting our users’ accounts is one of our top priorities, so we notify targets of <a href="http://googleonlinesecurity.blogspot.com/2012/06/security-warnings-for-suspected-state.html">state-sponsored attacks</a> and other <a href="http://googleonlinesecurity.blogspot.com/2010/03/detecting-suspicious-account-activity.html">suspicious activity</a>, and we take other appropriate actions to limit the impact of these attacks on our users. Especially if you are in Iran, we encourage you to <a href="https://support.google.com/mail/answer/2591015">take extra steps to protect your account</a>. Watching out for phishing, using a modern browser like Chrome and <a href="http://google.com/2step">enabling 2-step verification</a> can make you significantly more secure against these and many other types of attacks. Also, before typing your Google password, always verify that the URL in the address bar of your browser begins with https://accounts.google.com/. If the website's address does not match this text, please don’t enter your Google password.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/iranian-phishing-on-the-rise-as-elections-approach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Increased rewards for Google’s Web Vulnerability Reward Program</title>
		<link>https://googledata.org/uncategorized/increased-rewards-for-googles-web-vulnerability-reward-program/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=increased-rewards-for-googles-web-vulnerability-reward-program</link>
		<comments>https://googledata.org/uncategorized/increased-rewards-for-googles-web-vulnerability-reward-program/#comments</comments>
		<pubDate>Thu, 06 Jun 2013 22:38:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=6c9945203c70f27abbb7aedde2a2d624</guid>
		<description><![CDATA[<span>Posted by Adam Mein and Michal Zalewski, Security Team</span><br /><br />Our vulnerability reward programs have been very successful in helping us fix more bugs and better protect our users, while also strengthening our relationships with security researchers. Since <a href="http://googleonlinesecurity.blogspot.com.au/2010/11/rewarding-web-application-security.html">introducing</a> our reward program for web properties in November 2010, we&#8217;ve received over 1,500 qualifying vulnerability reports that span across Google&#8217;s services, as well as software written by companies we have acquired. We&#8217;ve paid $828,000 to more than 250 individuals, some of whom have doubled their total by donating their rewards to charity. For example, one of our bug finders decided to <a href="http://www.nilsjuenemann.de/2012/04/ethiopia-gets-new-school-thanks-to-xss.html">support a school project</a> in East Africa.<br /><br />In recognition of the difficulty involved in finding bugs in our most critical applications, we&#8217;re once again rolling out <a href="http://www.google.com/about/appsecurity/reward-program/index.html">updated rules</a> and significant reward increases for another group of bug categories:<br /><ul><li>Cross-site scripting (XSS) bugs on https://accounts.google.com now receive a reward of $7,500 (previously $3,133.7). Rewards for XSS bugs in other highly sensitive services such as Gmail and Google Wallet have been bumped up to $5,000 (previously $1,337), with normal Google properties increasing to $3,133.70 (previously $500).</li><li>The top reward for significant authentication bypasses / information leaks is now $7,500 (previously $5,000).</li></ul>As always, happy bug hunting! If you do find a security problem, please <a href="mailto:security@google.com">let us know</a>.<br /><br /><br /><br />]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Adam Mein and Michal Zalewski, Security Team</span><br /><br />Our vulnerability reward programs have been very successful in helping us fix more bugs and better protect our users, while also strengthening our relationships with security researchers. Since <a href="http://googleonlinesecurity.blogspot.com.au/2010/11/rewarding-web-application-security.html">introducing</a> our reward program for web properties in November 2010, we’ve received over 1,500 qualifying vulnerability reports that span across Google’s services, as well as software written by companies we have acquired. We’ve paid $828,000 to more than 250 individuals, some of whom have doubled their total by donating their rewards to charity. For example, one of our bug finders decided to <a href="http://www.nilsjuenemann.de/2012/04/ethiopia-gets-new-school-thanks-to-xss.html">support a school project</a> in East Africa.<br /><br />In recognition of the difficulty involved in finding bugs in our most critical applications, we’re once again rolling out <a href="http://www.google.com/about/appsecurity/reward-program/index.html">updated rules</a> and significant reward increases for another group of bug categories:<br /><ul><li>Cross-site scripting (XSS) bugs on https://accounts.google.com now receive a reward of $7,500 (previously $3,133.7). Rewards for XSS bugs in other highly sensitive services such as Gmail and Google Wallet have been bumped up to $5,000 (previously $1,337), with normal Google properties increasing to $3,133.70 (previously $500).</li><li>The top reward for significant authentication bypasses / information leaks is now $7,500 (previously $5,000).</li></ul>As always, happy bug hunting! If you do find a security problem, please <a href="mailto:security@google.com">let us know</a>.<br /><br /><br /><br />]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/increased-rewards-for-googles-web-vulnerability-reward-program/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Disclosure timeline for vulnerabilities under active attack</title>
		<link>https://googledata.org/uncategorized/disclosure-timeline-for-vulnerabilities-under-active-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=disclosure-timeline-for-vulnerabilities-under-active-attack</link>
		<comments>https://googledata.org/uncategorized/disclosure-timeline-for-vulnerabilities-under-active-attack/#comments</comments>
		<pubDate>Wed, 29 May 2013 21:45:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=b58503742610e79c691c157e67f91c31</guid>
		<description><![CDATA[<span>Posted by Chris Evans and Drew Hintz, Security Engineers</span><br /><br />We recently discovered that attackers are actively targeting a previously unknown and unpatched vulnerability in software belonging to another company. This isn&#8217;t an isolated incident -- on a semi-regular basis, Google security researchers uncover real-world exploitation of publicly unknown (&#8220;zero-day&#8221;) vulnerabilities. We always report these cases to the affected vendor immediately, and we work closely with them to drive the issue to resolution. Over the years, we&#8217;ve reported dozens of actively exploited zero-day vulnerabilities to affected vendors, including <a href="http://googleonlinesecurity.blogspot.com/2012/06/microsoft-xml-vulnerability-under.html">XML parsing vulnerabilities</a>, <a href="http://www.adobe.com/support/security/bulletins/apsb12-03.html">universal cross-site scripting bugs</a>, and <a href="http://security.tencent.com/index.php/announcement/msg/6">targeted web application attacks</a>.<br /><br />Often, we find that zero-day vulnerabilities are used to target a limited subset of people. In many cases, this targeting actually makes the attack more serious than a broader attack, and more urgent to resolve quickly. Political activists are frequent targets, and the consequences of being compromised can have real safety implications in parts of the world.<br /><br />Our standing <a href="http://googleonlinesecurity.blogspot.com/2010/07/rebooting-responsible-disclosure-focus.html">recommendation</a> is that companies should fix critical vulnerabilities within 60 days -- or, if a fix is not possible, they should notify the public about the risk and offer workarounds. We encourage researchers to publish their findings if reported issues will take longer to patch. Based on our experience, however, we believe that more urgent action -- within 7 days -- is appropriate for critical vulnerabilities under active exploitation. The reason for this special designation is that each day an actively exploited vulnerability remains undisclosed to the public and unpatched, more computers will be compromised. <br /><br />Seven days is an aggressive timeline and may be too short for some vendors to update their products, but it should be enough time to publish advice about possible mitigations, such as temporarily disabling a service, restricting access, or contacting the vendor for more information. As a result, after 7 days have elapsed without a patch or advisory, we will support researchers making details available so that users can take steps to protect themselves. By holding ourselves to the same standard, we hope to improve both the state of web security and the coordination of vulnerability management.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Chris Evans and Drew Hintz, Security Engineers</span><br /><br />We recently discovered that attackers are actively targeting a previously unknown and unpatched vulnerability in software belonging to another company. This isn’t an isolated incident -- on a semi-regular basis, Google security researchers uncover real-world exploitation of publicly unknown (“zero-day”) vulnerabilities. We always report these cases to the affected vendor immediately, and we work closely with them to drive the issue to resolution. Over the years, we’ve reported dozens of actively exploited zero-day vulnerabilities to affected vendors, including <a href="http://googleonlinesecurity.blogspot.com/2012/06/microsoft-xml-vulnerability-under.html">XML parsing vulnerabilities</a>, <a href="http://www.adobe.com/support/security/bulletins/apsb12-03.html">universal cross-site scripting bugs</a>, and <a href="http://security.tencent.com/index.php/announcement/msg/6">targeted web application attacks</a>.<br /><br />Often, we find that zero-day vulnerabilities are used to target a limited subset of people. In many cases, this targeting actually makes the attack more serious than a broader attack, and more urgent to resolve quickly. Political activists are frequent targets, and the consequences of being compromised can have real safety implications in parts of the world.<br /><br />Our standing <a href="http://googleonlinesecurity.blogspot.com/2010/07/rebooting-responsible-disclosure-focus.html">recommendation</a> is that companies should fix critical vulnerabilities within 60 days -- or, if a fix is not possible, they should notify the public about the risk and offer workarounds. We encourage researchers to publish their findings if reported issues will take longer to patch. Based on our experience, however, we believe that more urgent action -- within 7 days -- is appropriate for critical vulnerabilities under active exploitation. The reason for this special designation is that each day an actively exploited vulnerability remains undisclosed to the public and unpatched, more computers will be compromised. <br /><br />Seven days is an aggressive timeline and may be too short for some vendors to update their products, but it should be enough time to publish advice about possible mitigations, such as temporarily disabling a service, restricting access, or contacting the vendor for more information. As a result, after 7 days have elapsed without a patch or advisory, we will support researchers making details available so that users can take steps to protect themselves. By holding ourselves to the same standard, we hope to improve both the state of web security and the coordination of vulnerability management.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/disclosure-timeline-for-vulnerabilities-under-active-attack/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Changes to our SSL Certificates</title>
		<link>https://googledata.org/uncategorized/changes-to-our-ssl-certificates/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=changes-to-our-ssl-certificates</link>
		<comments>https://googledata.org/uncategorized/changes-to-our-ssl-certificates/#comments</comments>
		<pubDate>Thu, 23 May 2013 15:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=ef700189f5a5a8c23b5665f4a44a3c3a</guid>
		<description><![CDATA[<span>Posted by Stephen McHenry, Director of Information Security Engineering</span><br /><br />Protecting the security and privacy of our users is one of our most important tasks at Google, which is why we utilize encryption on almost all connections made to Google.<br /><br />This encryption needs to be updated at times to make it even stronger, so this year our SSL services will undergo a series of certificate upgrades&#8212;specifically, all of our SSL certificates will be upgraded to 2048-bit keys by the end of 2013. We will begin switching to the new 2048-bit certificates on August 1st, to ensure adequate time for a careful rollout before the end of the year. We&#8217;re also going to change the root certificate that signs all of our SSL certificates because it has a 1024-bit key.<br /><br />Most client software won&#8217;t have any problems with either of these changes, but we know that some configurations will require some extra steps to avoid complications. This is more often true of client software embedded in devices such as certain types of phones, printers, set-top boxes, gaming consoles, and cameras.<br /><br />For a smooth upgrade, client software that makes SSL connections to Google (e.g. HTTPS) <b><u><i>must</i></u></b>:<br /><ul><li>Perform normal validation of the certificate chain;</li><li>Include a properly extensive set of root certificates contained. We have an example set which should be sufficient for connecting to Google in <a href="http://pki.google.com/faq.html">our FAQ</a>. (Note: the contents of this list may change over time, so clients should have a way to update themselves as changes occur);</li><li>Support Subject Alternative Names (SANs).</li></ul>Also, clients <i><u>should</u></i> support the Server Name Indication (SNI) extension because clients may need to make an extra API call to set the hostname on an SSL connection. Any client unsure about SNI support can be tested against <a href="https://googlemail.com/">https://googlemail.com</a>&#8212;this URL should only validate if you are sending SNI.<br /><br />On the flip side, here are some examples of improper validation practices that could very well lead to the inability of client software to connect to Google using SSL after the upgrade:<br /><ul><li>Matching the leaf certificate exactly (e.g. by hashing it)</li><li>Matching any other certificate (e.g. Root or Intermediate signing certificate) exactly</li><li>Hard-coding the expected Root certificate, especially in firmware. This is sometimes done based on assumptions like the following:</li><ul><li>The Root Certificate of our chain will not change on short notice.</li><li>Google will always use Thawte as its Root CA.</li><li>Google will always use Equifax as its Root CA.</li><li>Google will always use one of a small number of Root CAs.</li><li>The certificate will always contain exactly the expected hostname in the Common Name field and therefore clients do not need to worry about SANs.</li><li>The certificate will always contain exactly the expected hostname in a SAN and therefore clients don't need to worry about wildcards.</li></ul></ul>Any software that contains these improper validation practices should be changed. More detailed information can be found in <a href="https://sites.google.com/site/x509certificateusage/">this document</a>, and you can also check out our <a href="http://pki.google.com/faq.html">FAQ</a> if you have specific questions.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Stephen McHenry, Director of Information Security Engineering</span><br /><br />Protecting the security and privacy of our users is one of our most important tasks at Google, which is why we utilize encryption on almost all connections made to Google.<br /><br />This encryption needs to be updated at times to make it even stronger, so this year our SSL services will undergo a series of certificate upgrades—specifically, all of our SSL certificates will be upgraded to 2048-bit keys by the end of 2013. We will begin switching to the new 2048-bit certificates on August 1st, to ensure adequate time for a careful rollout before the end of the year. We’re also going to change the root certificate that signs all of our SSL certificates because it has a 1024-bit key.<br /><br />Most client software won’t have any problems with either of these changes, but we know that some configurations will require some extra steps to avoid complications. This is more often true of client software embedded in devices such as certain types of phones, printers, set-top boxes, gaming consoles, and cameras.<br /><br />For a smooth upgrade, client software that makes SSL connections to Google (e.g. HTTPS) <b><u><i>must</i></u></b>:<br /><ul><li>Perform normal validation of the certificate chain;</li><li>Include a properly extensive set of root certificates contained. We have an example set which should be sufficient for connecting to Google in <a href="http://pki.google.com/faq.html">our FAQ</a>. (Note: the contents of this list may change over time, so clients should have a way to update themselves as changes occur);</li><li>Support Subject Alternative Names (SANs).</li></ul>Also, clients <i><u>should</u></i> support the Server Name Indication (SNI) extension because clients may need to make an extra API call to set the hostname on an SSL connection. Any client unsure about SNI support can be tested against <a href="https://googlemail.com/">https://googlemail.com</a>—this URL should only validate if you are sending SNI.<br /><br />On the flip side, here are some examples of improper validation practices that could very well lead to the inability of client software to connect to Google using SSL after the upgrade:<br /><ul><li>Matching the leaf certificate exactly (e.g. by hashing it)</li><li>Matching any other certificate (e.g. Root or Intermediate signing certificate) exactly</li><li>Hard-coding the expected Root certificate, especially in firmware. This is sometimes done based on assumptions like the following:</li><ul><li>The Root Certificate of our chain will not change on short notice.</li><li>Google will always use Thawte as its Root CA.</li><li>Google will always use Equifax as its Root CA.</li><li>Google will always use one of a small number of Root CAs.</li><li>The certificate will always contain exactly the expected hostname in the Common Name field and therefore clients do not need to worry about SANs.</li><li>The certificate will always contain exactly the expected hostname in a SAN and therefore clients don't need to worry about wildcards.</li></ul></ul>Any software that contains these improper validation practices should be changed. More detailed information can be found in <a href="https://sites.google.com/site/x509certificateusage/">this document</a>, and you can also check out our <a href="http://pki.google.com/faq.html">FAQ</a> if you have specific questions.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/changes-to-our-ssl-certificates/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>The results are in: Hardcode, the secure coding contest for App Engine</title>
		<link>https://googledata.org/uncategorized/the-results-are-in-hardcode-the-secure-coding-contest-for-app-engine/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-results-are-in-hardcode-the-secure-coding-contest-for-app-engine</link>
		<comments>https://googledata.org/uncategorized/the-results-are-in-hardcode-the-secure-coding-contest-for-app-engine/#comments</comments>
		<pubDate>Fri, 10 May 2013 15:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=0507ccf8708d968263dbf6362b50f4a6</guid>
		<description><![CDATA[<span>Posted by Eduardo Vela Nava, Security Team</span><br /><br />This January, Google and SyScan <a href="http://googleonlinesecurity.blogspot.com/2013/01/calling-student-coders-hardcode-secure.html">announced</a> a secure coding competition open to students from all over the world. While Google&#8217;s <a href="https://developers.google.com/open-source/soc/">Summer of Code</a> and <a href="https://developers.google.com/open-source/gci/2012/">Code-in</a> encourage students to contribute to open source projects, Hardcode was a call for students who wanted to showcase their skills both in software development and security. Given the scope of today&#8217;s online threats, we think it&#8217;s incredibly important to practice secure coding habits early on. Hundreds of students from 25 countries and across five continents signed up to receive updates and information about the competition, and over 100 teams participated.<br /><br /><div><a href="http://4.bp.blogspot.com/-7y9e_45sLpI/UYvraCNPmZI/AAAAAAAAFao/TIs2gOpsqOU/s1600/Finalists-working.jpg"><img border="0" height="240" src="http://4.bp.blogspot.com/-7y9e_45sLpI/UYvraCNPmZI/AAAAAAAAFao/TIs2gOpsqOU/s320/Finalists-working.jpg" width="320"></a></div><br />During the preliminary online round, teams built applications on Google App Engine that were judged for both functionality and security. Five teams were then selected to participate in the final round at the SyScan 2013 security conference in Singapore, where they had to do the following: fix security bugs from the preliminary round, collaborate to develop an API standard to allow their applications to interoperate, implement the API, and finally, try to hack each other&#8217;s applications. To add to the challenge, many of the students balanced the competition with all of their school commitments.<br /><br /><div><a href="http://3.bp.blogspot.com/-Hymrq_l3kXY/UYvrjBszQLI/AAAAAAAAFaw/qnRx6mZoMOk/s1600/Final-checks.JPG"><img border="0" height="240" src="http://3.bp.blogspot.com/-Hymrq_l3kXY/UYvrjBszQLI/AAAAAAAAFaw/qnRx6mZoMOk/s320/Final-checks.JPG" width="320"></a></div><br />We&#8217;re extremely impressed with the caliber of the contestants&#8217; work. Everyone had a lot of fun, and we think these students have a bright future ahead of them. We are pleased to announce the final results of the 2013 Hardcode Competition:<br /><br />1st Place:  <b>Team 0xC0DEBA5E</b><br /><b>Vienna University of Technology, Austria (SGD $20,000)</b><br />Daniel Marth (http://proggen.org/)<br />Lukas Pfeifhofer (https://www.devlabs.pro/)<br />Benedikt Wedenik<br /><br />2nd Place:  <b>Team Gridlock</b><br /><b>Loyola School, Jamshedpur, India (SGD $15,000)</b><br />Aviral Dasgupta (http://www.aviraldg.com/)<br /><br />3rd Place:  <b>Team CeciliaSec</b><br /><b>University of California, Santa Barbara, California, USA (SGD $10,000)</b><br />Nathan Crandall<br />Dane Pitkin<br />Justin Rushing<br /><br />Runner-up:  <b>Team AppDaptor</b><br /><b>The Hong Kong Polytechnic University, Hong Kong (SGD $5,000)</b><br />Lau Chun Wai (http://www.cwlau.com/)<br /><br />Runner-up:  <b>Team DesiCoders</b><br /><b>Birla Institute of Technology &#38; Science, Pilani, India (SGD $5,000)</b><br />Yash Agarwal<br />Vishesh Singhal (http://visheshsinghal.blogspot.com)<br /><br />Honorable Mention: <b>Team Saviors of Middle Earth</b> (withdrew due to school commitments)<br /><b>Walt Whitman High School, Maryland, USA</b><br />Wes Kendrick<br />Marc Rosen (https://github.com/maz)<br />William Zhang<br /><br />A big congratulations to this very talented group of students!]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Eduardo Vela Nava, Security Team</span><br /><br />This January, Google and SyScan <a href="http://googleonlinesecurity.blogspot.com/2013/01/calling-student-coders-hardcode-secure.html">announced</a> a secure coding competition open to students from all over the world. While Google’s <a href="https://developers.google.com/open-source/soc/">Summer of Code</a> and <a href="https://developers.google.com/open-source/gci/2012/">Code-in</a> encourage students to contribute to open source projects, Hardcode was a call for students who wanted to showcase their skills both in software development and security. Given the scope of today’s online threats, we think it’s incredibly important to practice secure coding habits early on. Hundreds of students from 25 countries and across five continents signed up to receive updates and information about the competition, and over 100 teams participated.<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://4.bp.blogspot.com/-7y9e_45sLpI/UYvraCNPmZI/AAAAAAAAFao/TIs2gOpsqOU/s1600/Finalists-working.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="http://4.bp.blogspot.com/-7y9e_45sLpI/UYvraCNPmZI/AAAAAAAAFao/TIs2gOpsqOU/s320/Finalists-working.jpg" width="320" /></a></div><br />During the preliminary online round, teams built applications on Google App Engine that were judged for both functionality and security. Five teams were then selected to participate in the final round at the SyScan 2013 security conference in Singapore, where they had to do the following: fix security bugs from the preliminary round, collaborate to develop an API standard to allow their applications to interoperate, implement the API, and finally, try to hack each other’s applications. To add to the challenge, many of the students balanced the competition with all of their school commitments.<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-Hymrq_l3kXY/UYvrjBszQLI/AAAAAAAAFaw/qnRx6mZoMOk/s1600/Final-checks.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="http://3.bp.blogspot.com/-Hymrq_l3kXY/UYvrjBszQLI/AAAAAAAAFaw/qnRx6mZoMOk/s320/Final-checks.JPG" width="320" /></a></div><br />We’re extremely impressed with the caliber of the contestants’ work. Everyone had a lot of fun, and we think these students have a bright future ahead of them. We are pleased to announce the final results of the 2013 Hardcode Competition:<br /><br />1st Place:  <b>Team 0xC0DEBA5E</b><br /><b>Vienna University of Technology, Austria (SGD $20,000)</b><br />Daniel Marth (http://proggen.org/)<br />Lukas Pfeifhofer (https://www.devlabs.pro/)<br />Benedikt Wedenik<br /><br />2nd Place:  <b>Team Gridlock</b><br /><b>Loyola School, Jamshedpur, India (SGD $15,000)</b><br />Aviral Dasgupta (http://www.aviraldg.com/)<br /><br />3rd Place:  <b>Team CeciliaSec</b><br /><b>University of California, Santa Barbara, California, USA (SGD $10,000)</b><br />Nathan Crandall<br />Dane Pitkin<br />Justin Rushing<br /><br />Runner-up:  <b>Team AppDaptor</b><br /><b>The Hong Kong Polytechnic University, Hong Kong (SGD $5,000)</b><br />Lau Chun Wai (http://www.cwlau.com/)<br /><br />Runner-up:  <b>Team DesiCoders</b><br /><b>Birla Institute of Technology &amp; Science, Pilani, India (SGD $5,000)</b><br />Yash Agarwal<br />Vishesh Singhal (http://visheshsinghal.blogspot.com)<br /><br />Honorable Mention: <b>Team Saviors of Middle Earth</b> (withdrew due to school commitments)<br /><b>Walt Whitman High School, Maryland, USA</b><br />Wes Kendrick<br />Marc Rosen (https://github.com/maz)<br />William Zhang<br /><br />A big congratulations to this very talented group of students!]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/the-results-are-in-hardcode-the-secure-coding-contest-for-app-engine/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>New warnings about potentially malicious binaries</title>
		<link>https://googledata.org/google-online-security/new-warnings-about-potentially-malicious-binaries/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-warnings-about-potentially-malicious-binaries</link>
		<comments>https://googledata.org/google-online-security/new-warnings-about-potentially-malicious-binaries/#comments</comments>
		<pubDate>Wed, 17 Apr 2013 16:02:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=2e1ad5e7cf54d3271edb7209cabf71fe</guid>
		<description><![CDATA[<span>Posted by Moheeb Abu Rajab, Security Team</span><br /><br />If you use Chrome, you shouldn&#8217;t have to work hard to know what Chrome extensions you have installed and enabled. That&#8217;s why last December we announced that Chrome (version 25 and beyond) would <a href="http://blog.chromium.org/2012/12/no-more-silent-extension-installs.html">disable silent extension installation by default</a>. In addition to protecting users from unauthorized installations, these measures resulted in noticeable performance improvements in Chrome and improved user experience. <br /><br />To further safeguard you while browsing the web, we recently added new measures to protect you and your computer. These measures will identify software that violates Chrome&#8217;s standard mechanisms for deploying extensions, flagging such binaries as malware. Within a week, you will start seeing Safe Browsing <a href="http://googleonlinesecurity.blogspot.com/2011/04/protecting-users-from-malicious.html">malicious download warnings</a> when attempting to download malware identified by this criteria. <br /><br />This kind of malware commonly tries to get around silent installation blockers by misusing <a href="http://www.chromium.org/administrators">Chrome&#8217;s central management settings</a> that are intended be used to configure instances of Chrome internally within an organization. In doing so, the installed extensions are enabled by default and cannot be uninstalled or disabled by the user from within Chrome. Other variants include binaries that directly manipulate Chrome preferences in order to silently install and enable extensions bundled with these binaries. Our recent measures expand our capabilities to detect and block these types of malware.<br /><br />Application developers should adhere to Chrome&#8217;s standard mechanisms for extension installation, which include the <a href="https://chrome.google.com/webstore/category/extensions">Chrome Web Store</a>, <a href="https://developers.google.com/chrome/web-store/docs/inline_installation">inline installation</a>, and the <a href="http://developer.chrome.com/extensions/external_extensions.html">other deployment options</a> described in the extensions development documentation.<br /><br /><br />]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Moheeb Abu Rajab, Security Team</span><br /><br />If you use Chrome, you shouldn’t have to work hard to know what Chrome extensions you have installed and enabled. That’s why last December we announced that Chrome (version 25 and beyond) would <a href="http://blog.chromium.org/2012/12/no-more-silent-extension-installs.html">disable silent extension installation by default</a>. In addition to protecting users from unauthorized installations, these measures resulted in noticeable performance improvements in Chrome and improved user experience. <br /><br />To further safeguard you while browsing the web, we recently added new measures to protect you and your computer. These measures will identify software that violates Chrome’s standard mechanisms for deploying extensions, flagging such binaries as malware. Within a week, you will start seeing Safe Browsing <a href="http://googleonlinesecurity.blogspot.com/2011/04/protecting-users-from-malicious.html">malicious download warnings</a> when attempting to download malware identified by this criteria. <br /><br />This kind of malware commonly tries to get around silent installation blockers by misusing <a href="http://www.chromium.org/administrators">Chrome’s central management settings</a> that are intended be used to configure instances of Chrome internally within an organization. In doing so, the installed extensions are enabled by default and cannot be uninstalled or disabled by the user from within Chrome. Other variants include binaries that directly manipulate Chrome preferences in order to silently install and enable extensions bundled with these binaries. Our recent measures expand our capabilities to detect and block these types of malware.<br /><br />Application developers should adhere to Chrome’s standard mechanisms for extension installation, which include the <a href="https://chrome.google.com/webstore/category/extensions">Chrome Web Store</a>, <a href="https://developers.google.com/chrome/web-store/docs/inline_installation">inline installation</a>, and the <a href="http://developer.chrome.com/extensions/external_extensions.html">other deployment options</a> described in the extensions development documentation.<br /><br /><br />]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/new-warnings-about-potentially-malicious-binaries/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Google Public DNS Now Supports DNSSEC Validation</title>
		<link>https://googledata.org/uncategorized/google-public-dns-now-supports-dnssec-validation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=google-public-dns-now-supports-dnssec-validation</link>
		<comments>https://googledata.org/uncategorized/google-public-dns-now-supports-dnssec-validation/#comments</comments>
		<pubDate>Tue, 19 Mar 2013 15:30:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
		
		<guid isPermaLink="false">https://googledata.org/?guid=8f6d189a9e7a8eea22186638d37d5012</guid>
		<description><![CDATA[<span>Posted by Yunhong Gu, Team Lead, Google Public DNS</span><br /><br />We <a href="http://googleblog.blogspot.com/2009/12/introducing-google-public-dns.html">launched</a> Google Public DNS three years ago to help make the Internet faster and more secure. Today, we are taking a major step towards this security goal: we now fully support DNSSEC (<a href="http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions">Domain Name System Security Extensions</a>) validation on our Google Public DNS resolvers. Previously, we accepted and forwarded DNSSEC-formatted messages but did not perform validation. With this new security feature, we can better protect people from DNS-based attacks and make DNS more secure overall by identifying and rejecting invalid responses from DNSSEC-protected domains.<br /><br />DNS translates human-readable domain names into IP addresses so that they are accessible by computers. Despite its critical role in Internet applications, the lack of security protection for DNS up to this point meant that a significantly large portion of today&#8217;s Internet attacks target the name resolution process, attempting to return the IP addresses of malicious websites to DNS queries. Probably the most common DNS attack is <a href="http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html">DNS cache poisoning</a>, which tries to &#8220;pollute&#8221; the cache of DNS resolvers (such as Google Public DNS or those provided by most ISPs) by injecting spoofed responses to upstream DNS queries.<br /><br />To counter cache poisoning attacks, resolvers must be able to verify the authenticity of the response. DNSSEC solves the problem by authenticating DNS responses using digital signatures and public key cryptography. Each DNS zone maintains a set of private/public key pairs, and for each DNS record, a unique digital signature is generated and encrypted using the private key. The corresponding public key is then authenticated via a chain of trust by keys of upper-level zones. DNSSEC effectively prevents response tampering because in practice, signatures are almost impossible to forge without access to private keys. Also, the resolvers will reject responses without correct signatures.<br /><br />DNSSEC is a critical step towards securing the Internet. By validating data origin and data integrity, DNSSEC complements other Internet security mechanisms, such as SSL. It is worth noting that although we have used web access in the examples above, DNS infrastructure is widely used in many other Internet applications, including email.<br /><br />Currently Google Public DNS is serving more than 130 billion DNS queries on average (peaking at 150 billion) from more than 70 million unique IP addresses each day. However, only 7% of queries from the client side are DNSSEC-enabled (about 3% requesting validation and 4% requesting DNSSEC data but no validation) and about 1% of DNS responses from the name server side are signed. Overall, DNSSEC is still at an early stage and we hope that our support will help expedite its deployment.<br /><br />Effective deployment of DNSSEC requires action from both DNS resolvers and authoritative name servers. Resolvers, especially those of ISPs and other public resolvers, need to start validating DNS responses. Meanwhile, domain owners have to sign their domains. Today, about 1/3 of top-level domains have been signed, but most second-level domains remain unsigned. We encourage all involved parties to push DNSSEC deployment and further protect Internet users from DNS-based network intrusions.<br /><br />For more information about Google Public DNS, please visit: <a href="https://developers.google.com/speed/public-dns">https://developers.google.com/speed/public-dns</a>. In particular, more details about our DNSSEC support can be found in the <a href="https://developers.google.com/speed/public-dns/faq">FAQ</a> and <a href="https://developers.google.com/speed/public-dns/docs/security">Security</a> pages. Additionally, general specifications of the DNSSEC standard can be found in RFCs <a href="http://www.ietf.org/rfc/rfc4033.txt">4033</a>, <a href="http://www.ietf.org/rfc/rfc4034.txt">4034</a>, <a href="http://www.ietf.org/rfc/rfc4035.txt">4035</a>, and <a href="http://www.ietf.org/rfc/rfc5155.txt">5155</a>.<br /><br /><b><i>Update</i></b> <i>March 21</i>: We've been listening to your questions and would like to clarify that validation is not yet enabled for non-DNSSEC aware clients. As a first step, we launched DNSSEC validation as an opt-in feature and will only perform validation if clients explicitly request it. We're going to work to minimize the impact of any DNSSEC misconfigurations that could cause connection breakages before we enable validation by default for all clients that have not explicitly opted out.<br /><br /><b><i>Update</i></b> <i>May 6</i>: We've enabled DNSSEC validation by default. That means all clients are now protected and responses to all queries will be validated unless clients explicitly opt out.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Yunhong Gu, Team Lead, Google Public DNS</span><br /><br />We <a href="http://googleblog.blogspot.com/2009/12/introducing-google-public-dns.html">launched</a> Google Public DNS three years ago to help make the Internet faster and more secure. Today, we are taking a major step towards this security goal: we now fully support DNSSEC (<a href="http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions">Domain Name System Security Extensions</a>) validation on our Google Public DNS resolvers. Previously, we accepted and forwarded DNSSEC-formatted messages but did not perform validation. With this new security feature, we can better protect people from DNS-based attacks and make DNS more secure overall by identifying and rejecting invalid responses from DNSSEC-protected domains.<br /><br />DNS translates human-readable domain names into IP addresses so that they are accessible by computers. Despite its critical role in Internet applications, the lack of security protection for DNS up to this point meant that a significantly large portion of today’s Internet attacks target the name resolution process, attempting to return the IP addresses of malicious websites to DNS queries. Probably the most common DNS attack is <a href="http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html">DNS cache poisoning</a>, which tries to “pollute” the cache of DNS resolvers (such as Google Public DNS or those provided by most ISPs) by injecting spoofed responses to upstream DNS queries.<br /><br />To counter cache poisoning attacks, resolvers must be able to verify the authenticity of the response. DNSSEC solves the problem by authenticating DNS responses using digital signatures and public key cryptography. Each DNS zone maintains a set of private/public key pairs, and for each DNS record, a unique digital signature is generated and encrypted using the private key. The corresponding public key is then authenticated via a chain of trust by keys of upper-level zones. DNSSEC effectively prevents response tampering because in practice, signatures are almost impossible to forge without access to private keys. Also, the resolvers will reject responses without correct signatures.<br /><br />DNSSEC is a critical step towards securing the Internet. By validating data origin and data integrity, DNSSEC complements other Internet security mechanisms, such as SSL. It is worth noting that although we have used web access in the examples above, DNS infrastructure is widely used in many other Internet applications, including email.<br /><br />Currently Google Public DNS is serving more than 130 billion DNS queries on average (peaking at 150 billion) from more than 70 million unique IP addresses each day. However, only 7% of queries from the client side are DNSSEC-enabled (about 3% requesting validation and 4% requesting DNSSEC data but no validation) and about 1% of DNS responses from the name server side are signed. Overall, DNSSEC is still at an early stage and we hope that our support will help expedite its deployment.<br /><br />Effective deployment of DNSSEC requires action from both DNS resolvers and authoritative name servers. Resolvers, especially those of ISPs and other public resolvers, need to start validating DNS responses. Meanwhile, domain owners have to sign their domains. Today, about 1/3 of top-level domains have been signed, but most second-level domains remain unsigned. We encourage all involved parties to push DNSSEC deployment and further protect Internet users from DNS-based network intrusions.<br /><br />For more information about Google Public DNS, please visit: <a href="https://developers.google.com/speed/public-dns">https://developers.google.com/speed/public-dns</a>. In particular, more details about our DNSSEC support can be found in the <a href="https://developers.google.com/speed/public-dns/faq">FAQ</a> and <a href="https://developers.google.com/speed/public-dns/docs/security">Security</a> pages. Additionally, general specifications of the DNSSEC standard can be found in RFCs <a href="http://www.ietf.org/rfc/rfc4033.txt">4033</a>, <a href="http://www.ietf.org/rfc/rfc4034.txt">4034</a>, <a href="http://www.ietf.org/rfc/rfc4035.txt">4035</a>, and <a href="http://www.ietf.org/rfc/rfc5155.txt">5155</a>.<br /><br /><b><i>Update</i></b> <i>March 21</i>: We've been listening to your questions and would like to clarify that validation is not yet enabled for non-DNSSEC aware clients. As a first step, we launched DNSSEC validation as an opt-in feature and will only perform validation if clients explicitly request it. We're going to work to minimize the impact of any DNSSEC misconfigurations that could cause connection breakages before we enable validation by default for all clients that have not explicitly opted out.<br /><br /><b><i>Update</i></b> <i>May 6</i>: We've enabled DNSSEC validation by default. That means all clients are now protected and responses to all queries will be validated unless clients explicitly opt out.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/google-public-dns-now-supports-dnssec-validation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Calling student coders: Hardcode, the secure coding contest for App Engine</title>
		<link>https://googledata.org/google-online-security/calling-student-coders-hardcode-the-secure-coding-contest-for-app-engine/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=calling-student-coders-hardcode-the-secure-coding-contest-for-app-engine</link>
		<comments>https://googledata.org/google-online-security/calling-student-coders-hardcode-the-secure-coding-contest-for-app-engine/#comments</comments>
		<pubDate>Thu, 10 Jan 2013 19:17:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=b86927322a4578de7020b45b5fe88ee9</guid>
		<description><![CDATA[<span>Posted by Parisa Tabriz, Security Team</span><br /><br />Protecting user security and privacy is a huge responsibility, and software security is a big part of it. Learning about new ways to &#8220;break&#8221; applications is important, but learning preventative skills to use when &#8220;building&#8221; software, like secure design and coding practices, is just as critical. To help promote secure development habits, Google is once again partnering with the organizers of <a href="http://www.syscan.org/">SyScan</a> to host Hardcode, a secure coding contest on the Google App Engine platform.<br /><br />Participation will be open to teams of up to 5 full-time students (undergraduate or high school, additional restrictions may apply). Contestants will be asked to develop open source applications that meet a set of functional and security requirements. The contest will consist of two rounds: a qualifying round over the Internet, with broad participation from any team of students, and a final round, to be held during SyScan on April 23-25 in Singapore. <br /><br />During the qualifying round, teams will be tasked with building an application and describing its security design. A panel of judges will assess all submitted applications and select the top five to compete in the final round.<br /><br />At SyScan, the five finalist teams will be asked to develop a set of additional features and fix any security flaws identified in their qualifying submission. After two more days of hacking, a panel of judges will rank the projects and select a grand prize winning team that will receive $20,000 Singapore dollars. The 2nd-5th place finalist teams will receive $15,000, $10,000, $5,000, and $5,000 Singapore dollars, respectively.<br /><br />Hardcode begins on Friday, January 18th. Full contest details will be be announced via our mailing list, so subscribe <a href="https://groups.google.com/group/hardcode-2013/subscribe">there</a> for more information!]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Parisa Tabriz, Security Team</span><br /><br />Protecting user security and privacy is a huge responsibility, and software security is a big part of it. Learning about new ways to “break” applications is important, but learning preventative skills to use when “building” software, like secure design and coding practices, is just as critical. To help promote secure development habits, Google is once again partnering with the organizers of <a href="http://www.syscan.org/">SyScan</a> to host Hardcode, a secure coding contest on the Google App Engine platform.<br /><br />Participation will be open to teams of up to 5 full-time students (undergraduate or high school, additional restrictions may apply). Contestants will be asked to develop open source applications that meet a set of functional and security requirements. The contest will consist of two rounds: a qualifying round over the Internet, with broad participation from any team of students, and a final round, to be held during SyScan on April 23-25 in Singapore. <br /><br />During the qualifying round, teams will be tasked with building an application and describing its security design. A panel of judges will assess all submitted applications and select the top five to compete in the final round.<br /><br />At SyScan, the five finalist teams will be asked to develop a set of additional features and fix any security flaws identified in their qualifying submission. After two more days of hacking, a panel of judges will rank the projects and select a grand prize winning team that will receive $20,000 Singapore dollars. The 2nd-5th place finalist teams will receive $15,000, $10,000, $5,000, and $5,000 Singapore dollars, respectively.<br /><br />Hardcode begins on Friday, January 18th. Full contest details will be be announced via our mailing list, so subscribe <a href="https://groups.google.com/group/hardcode-2013/subscribe">there</a> for more information!]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/calling-student-coders-hardcode-the-secure-coding-contest-for-app-engine/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Enhancing digital certificate security</title>
		<link>https://googledata.org/google-online-security/enhancing-digital-certificate-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=enhancing-digital-certificate-security</link>
		<comments>https://googledata.org/google-online-security/enhancing-digital-certificate-security/#comments</comments>
		<pubDate>Thu, 03 Jan 2013 18:01:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=a888dd5bf74cbd182c5fa82cb94483e7</guid>
		<description><![CDATA[<span>Posted by Adam Langley, Software Engineer</span><br /><br />Late on December 24, Chrome detected and blocked an unauthorized digital certificate for the "*.google.com" domain. We investigated immediately and found the certificate was issued by an <a href="http://en.wikipedia.org/wiki/Intermediate_certificate_authorities">intermediate certificate authority</a> (CA) linking back to TURKTRUST, a Turkish certificate authority. Intermediate CA certificates carry the full authority of the CA, so anyone who has one can use it to create a certificate for any website they wish to impersonate. <br /><br />In response, we updated Chrome&#8217;s certificate revocation metadata on December 25 to block that intermediate CA, and then alerted TURKTRUST and other browser vendors. TURKTRUST told us that based on our information, they discovered that, in August 2011, they had mistakenly issued two intermediate CA certificates to organizations that should have instead received regular SSL certificates. On December 26, we pushed another Chrome metadata update to block the second mistaken CA certificate and informed the other browser vendors. <br /><br />Our actions addressed the immediate problem for our users. Given the severity of the situation, we will update Chrome again in January to no longer indicate Extended Validation status for certificates issued by TURKTRUST, though connections to TURKTRUST-validated HTTPS servers may continue to be allowed.<br /><br />Since our priority is the security and privacy of our users, we may also decide to take additional action after further discussion and careful consideration.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Adam Langley, Software Engineer</span><br /><br />Late on December 24, Chrome detected and blocked an unauthorized digital certificate for the "*.google.com" domain. We investigated immediately and found the certificate was issued by an <a href="http://en.wikipedia.org/wiki/Intermediate_certificate_authorities">intermediate certificate authority</a> (CA) linking back to TURKTRUST, a Turkish certificate authority. Intermediate CA certificates carry the full authority of the CA, so anyone who has one can use it to create a certificate for any website they wish to impersonate. <br /><br />In response, we updated Chrome’s certificate revocation metadata on December 25 to block that intermediate CA, and then alerted TURKTRUST and other browser vendors. TURKTRUST told us that based on our information, they discovered that, in August 2011, they had mistakenly issued two intermediate CA certificates to organizations that should have instead received regular SSL certificates. On December 26, we pushed another Chrome metadata update to block the second mistaken CA certificate and informed the other browser vendors. <br /><br />Our actions addressed the immediate problem for our users. Given the severity of the situation, we will update Chrome again in January to no longer indicate Extended Validation status for certificates issued by TURKTRUST, though connections to TURKTRUST-validated HTTPS servers may continue to be allowed.<br /><br />Since our priority is the security and privacy of our users, we may also decide to take additional action after further discussion and careful consideration. ]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/enhancing-digital-certificate-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Adding OAuth 2.0 support for IMAP/SMTP and XMPP to enhance auth security</title>
		<link>https://googledata.org/google-online-security/adding-oauth-2-0-support-for-imapsmtp-and-xmpp-to-enhance-auth-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=adding-oauth-2-0-support-for-imapsmtp-and-xmpp-to-enhance-auth-security</link>
		<comments>https://googledata.org/google-online-security/adding-oauth-2-0-support-for-imapsmtp-and-xmpp-to-enhance-auth-security/#comments</comments>
		<pubDate>Mon, 17 Sep 2012 18:49:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=9209fd54004e105cc53814b9d4673b1e</guid>
		<description><![CDATA[<span>Posted by Ryan Troll, Application Security Team</span>  <br /><br /><i>(Cross-posted from the <a href="http://googledevelopers.blogspot.com/2012/09/adding-oauth-20-support-for-imapsmtp.html">Google Developers Blog</a>)</i><br /><br />Our users and developers take password security seriously and so do we. Passwords alone have weaknesses we all know about, so we&#8217;re working over the long term to support additional mechanisms to help protect user information. Over a year ago, <a href="http://googledevelopers.blogspot.com/2011/03/making-auth-easier-oauth-20-for-google.html">we announced</a> a recommendation that <a href="http://oauth.net/2/">OAuth 2.0</a> become the standard authentication mechanism for our APIs so you can make the safest apps using Google platforms. You can use OAuth 2.0 to build clients and websites that securely access account data and work with our advanced security features, such as <i><a href="http://googleonlinesecurity.blogspot.com/2011/07/2-step-verification-stay-safe-around.html">2-step verification</a></i>. But our commitment to OAuth 2.0 is not limited to web APIs. Today we&#8217;re going a step further by adding OAuth 2.0 support for <a href="https://developers.google.com/google-apps/gmail/xoauth2_protocol">IMAP/SMTP</a> and <a href="https://developers.google.com/talk/jep_extensions/oauth">XMPP</a>. Developers using these protocols can now move to OAuth 2.0, and users will experience the benefits of more secure OAuth 2.0 clients.<br /><br />When clients use OAuth 2.0, they never ask users for passwords. Users have tighter control over what data clients have access to, and clients never see a user's password, making it much harder for a password to be stolen. If a user has their laptop stolen, or has any reason to believe that a client has been compromised, they can revoke the client&#8217;s access without impacting anything else that has access to their data.<br /><br />We are also announcing the deprecation of older authentication mechanisms. If you&#8217;re using these you should move to the new OAuth 2.0 APIs.<br /><ul><li>We are deprecating <a href="https://developers.google.com/google-apps/gmail/oauth_overview">XOAUTH for IMAP/SMTP</a>, as it uses <a href="http://googledevelopers.blogspot.com/2012/04/changes-to-deprecation-policies-and-api.html">OAuth 1.0a, which was previously deprecated</a>. Gmail will continue to support XOAUTH until OAuth 1.0a is shut down, at which time support will be discontinued.</li><li>We are also deprecating X-GOOGLE-TOKEN and <a href="http://tools.ietf.org/html/rfc4616">SASL PLAIN</a> for XMPP, as they either accept passwords or rely on <a href="http://googledevelopers.blogspot.com/2012/04/changes-to-deprecation-policies-and-api.html">the previously deprecated ClientLogin</a>. These mechanisms will continue to be supported until ClientLogin is shut down, at which time support for both will be discontinued.</li></ul>Our team has been working hard since we announced our support of OAuth in 2008 to make it easy for you to create applications that use more secure mechanisms than passwords to protect user information. Check out the <a href="http://googledevelopers.blogspot.com/search/label/oauth">Google Developers Blog</a> for examples, including the <a href="http://googledevelopers.blogspot.com/2011/11/oauth-20-playground-open-to-developers.html">OAuth 2.0 Playground</a> and <a href="http://googledevelopers.blogspot.com/2012/03/service-accounts-have-arrived.html">Service Accounts</a>, or see <a href="https://developers.google.com/accounts/docs/OAuth2">Using OAuth 2.0 to Access Google APIs</a>.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Ryan Troll, Application Security Team</span>  <br /><br /><i>(Cross-posted from the <a href="http://googledevelopers.blogspot.com/2012/09/adding-oauth-20-support-for-imapsmtp.html">Google Developers Blog</a>)</i><br /><br />Our users and developers take password security seriously and so do we. Passwords alone have weaknesses we all know about, so we’re working over the long term to support additional mechanisms to help protect user information. Over a year ago, <a href="http://googledevelopers.blogspot.com/2011/03/making-auth-easier-oauth-20-for-google.html">we announced</a> a recommendation that <a href="http://oauth.net/2/">OAuth 2.0</a> become the standard authentication mechanism for our APIs so you can make the safest apps using Google platforms. You can use OAuth 2.0 to build clients and websites that securely access account data and work with our advanced security features, such as <i><a href="http://googleonlinesecurity.blogspot.com/2011/07/2-step-verification-stay-safe-around.html">2-step verification</a></i>. But our commitment to OAuth 2.0 is not limited to web APIs. Today we’re going a step further by adding OAuth 2.0 support for <a href="https://developers.google.com/google-apps/gmail/xoauth2_protocol">IMAP/SMTP</a> and <a href="https://developers.google.com/talk/jep_extensions/oauth">XMPP</a>. Developers using these protocols can now move to OAuth 2.0, and users will experience the benefits of more secure OAuth 2.0 clients.<br /><br />When clients use OAuth 2.0, they never ask users for passwords. Users have tighter control over what data clients have access to, and clients never see a user's password, making it much harder for a password to be stolen. If a user has their laptop stolen, or has any reason to believe that a client has been compromised, they can revoke the client’s access without impacting anything else that has access to their data.<br /><br />We are also announcing the deprecation of older authentication mechanisms. If you’re using these you should move to the new OAuth 2.0 APIs.<br /><ul><li>We are deprecating <a href="https://developers.google.com/google-apps/gmail/oauth_overview">XOAUTH for IMAP/SMTP</a>, as it uses <a href="http://googledevelopers.blogspot.com/2012/04/changes-to-deprecation-policies-and-api.html">OAuth 1.0a, which was previously deprecated</a>. Gmail will continue to support XOAUTH until OAuth 1.0a is shut down, at which time support will be discontinued.</li><li>We are also deprecating X-GOOGLE-TOKEN and <a href="http://tools.ietf.org/html/rfc4616">SASL PLAIN</a> for XMPP, as they either accept passwords or rely on <a href="http://googledevelopers.blogspot.com/2012/04/changes-to-deprecation-policies-and-api.html">the previously deprecated ClientLogin</a>. These mechanisms will continue to be supported until ClientLogin is shut down, at which time support for both will be discontinued.</li></ul>Our team has been working hard since we announced our support of OAuth in 2008 to make it easy for you to create applications that use more secure mechanisms than passwords to protect user information. Check out the <a href="http://googledevelopers.blogspot.com/search/label/oauth">Google Developers Blog</a> for examples, including the <a href="http://googledevelopers.blogspot.com/2011/11/oauth-20-playground-open-to-developers.html">OAuth 2.0 Playground</a> and <a href="http://googledevelopers.blogspot.com/2012/03/service-accounts-have-arrived.html">Service Accounts</a>, or see <a href="https://developers.google.com/accounts/docs/OAuth2">Using OAuth 2.0 to Access Google APIs</a>.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/adding-oauth-2-0-support-for-imapsmtp-and-xmpp-to-enhance-auth-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Content hosting for the modern web</title>
		<link>https://googledata.org/google-online-security/content-hosting-for-the-modern-web/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=content-hosting-for-the-modern-web</link>
		<comments>https://googledata.org/google-online-security/content-hosting-for-the-modern-web/#comments</comments>
		<pubDate>Wed, 29 Aug 2012 16:45:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=337b059358ba9eac07b1e5c933aab014</guid>
		<description><![CDATA[<span>Posted by Michal Zalewski, Security Team</span><br /><br />Our applications host a variety of web content on behalf of our users, and over the years we learned that even something as simple as serving a profile image can be surprisingly fraught with pitfalls. Today, we wanted to share some of our findings about content hosting, along with the approaches we developed to mitigate the risks.<br /><br />Historically, all browsers and browser plugins were designed simply to excel at displaying several common types of web content, and to be tolerant of any mistakes made by website owners. In the days of static HTML and simple web applications, giving the owner of the domain authoritative control over how the content is displayed wasn&#8217;t of any importance.<br /><br />It wasn&#8217;t until the mid-2000s that we started to notice a problem: a clever attacker could manipulate the browser into interpreting seemingly harmless images or text documents as HTML, Java, or Flash&#8212;thus gaining the ability to execute malicious scripts in the <a href="http://en.wikipedia.org/wiki/Same_origin_policy">security context</a> of the application displaying these documents (essentially, a <a href="http://en.wikipedia.org/wiki/Cross-site_scripting">cross-site scripting flaw</a>). For all the increasingly sensitive web applications, this was very bad news.<br /><br />During the past few years, modern browsers began to improve. For example, the browser vendors limited the amount of second-guessing performed on text documents, certain types of images, and unknown MIME types. However, there are many standards-enshrined design decisions&#8212;such as ignoring MIME information on any content loaded through <i>&#60;object&#62;</i> , <i>&#60;embed&#62;</i> , or <i>&#60;applet&#62;</i> &#8212;that are much more difficult to fix; these practices may lead to vulnerabilities similar to the <a href="http://xs-sniper.com/blog/2008/12/17/sun-fixes-gifars/">GIFAR bug</a>.<br /><br />Google&#8217;s security team played an active role in investigating and remediating many content sniffing vulnerabilities during this period. In fact, many of the enforcement proposals were first prototyped in Chrome. Even still, the overall progress is slow; for every resolved problem, researchers discover a previously unknown flaw in another browser mechanism. Two recent examples are the Byte Order Mark (BOM) vulnerability reported to us by Masato Kinugawa, or the <a href="http://googleonlinesecurity.blogspot.com/2011/03/mhtml-vulnerability-under-active.html">MHTML attacks</a> that we have seen happening in the wild.<br /><br />For a while, we focused on content sanitization as a possible workaround - but in many cases, we found it to be insufficient. For example, Aleksandr Dobkin managed to construct a purely alphanumeric Flash applet, and in our internal work the Google security team created images that can be forced to include a particular plaintext string in their body, after being scrubbed and recoded in a deterministic way.<br /><br />In the end, we reacted to this raft of content hosting problems by placing some of the high-risk content in separate, isolated <a href="http://en.wikipedia.org/wiki/Same_origin_policy">web origins</a>&#8212;most commonly <i>*.googleusercontent.com</i>. There, the &#8220;sandboxed&#8221; files pose virtually no threat to the applications themselves, or to google.com authentication cookies. For public content, that&#8217;s all we need: we may use random or user-specific subdomains, depending on the degree of isolation required between unrelated documents, but otherwise the solution just works.<br /><br />The situation gets more interesting for non-public documents, however. Copying users&#8217; normal authentication cookies to the &#8220;sandbox&#8221; domain would defeat the purpose. The natural alternative is to move the secret token used to confer access rights from the <i>Cookie</i> header to a value embedded in the URL, and make the token unique to every document instead of keeping it global.<br /><br />While this solution eliminates many of the <a href="http://lcamtuf.blogspot.com/2010/10/http-cookies-or-how-not-to-design.html">significant design flaws</a> associated with HTTP cookies, it trades one imperfect authentication mechanism for another. In particular, it&#8217;s important to note there are more ways to accidentally leak a capability-bearing URL than there are to accidentally leak cookies; the most notable risk is disclosure through the <i>Referer</i> header for any document format capable of including external subresources or of linking to external sites.<br /><br />In our applications, we take a risk-based approach. Generally speaking, we tend to use three strategies:<br /><ul><li>In higher risk situations (e.g. documents with elevated risk of URL disclosure), we may couple the URL token scheme with short-lived, document-specific cookies issued for specific subdomains of <i>googleusercontent.com</i>. This mechanism, known within Google as <i>FileComp</i>, relies on a range of attack mitigation strategies that are too disruptive for Google applications at large, but work well in this highly constrained use case.</li></ul><ul><li>In cases where the risk of leaks is limited but responsive access controls are preferable (e.g., embedded images), we may issue URLs bound to a specific user, or ones that expire quickly.</li></ul><ul><li>In low-risk scenarios, where usability requirements necessitate a more balanced approach, we may opt for globally valid, longer-lived URLs.</li></ul>Of course, the research into the security of web browsers continues, and the landscape of web applications is evolving rapidly. We are constantly tweaking our solutions to protect Google users even better, and even the solutions described here may change. Our commitment to making the Internet a safer place, however, will never waver.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Michal Zalewski, Security Team</span><br /><br />Our applications host a variety of web content on behalf of our users, and over the years we learned that even something as simple as serving a profile image can be surprisingly fraught with pitfalls. Today, we wanted to share some of our findings about content hosting, along with the approaches we developed to mitigate the risks.<br /><br />Historically, all browsers and browser plugins were designed simply to excel at displaying several common types of web content, and to be tolerant of any mistakes made by website owners. In the days of static HTML and simple web applications, giving the owner of the domain authoritative control over how the content is displayed wasn’t of any importance.<br /><br />It wasn’t until the mid-2000s that we started to notice a problem: a clever attacker could manipulate the browser into interpreting seemingly harmless images or text documents as HTML, Java, or Flash—thus gaining the ability to execute malicious scripts in the <a href="http://en.wikipedia.org/wiki/Same_origin_policy">security context</a> of the application displaying these documents (essentially, a <a href="http://en.wikipedia.org/wiki/Cross-site_scripting">cross-site scripting flaw</a>). For all the increasingly sensitive web applications, this was very bad news.<br /><br />During the past few years, modern browsers began to improve. For example, the browser vendors limited the amount of second-guessing performed on text documents, certain types of images, and unknown MIME types. However, there are many standards-enshrined design decisions—such as ignoring MIME information on any content loaded through <i>&lt;object&gt;</i> , <i>&lt;embed&gt;</i> , or <i>&lt;applet&gt;</i> —that are much more difficult to fix; these practices may lead to vulnerabilities similar to the <a href="http://xs-sniper.com/blog/2008/12/17/sun-fixes-gifars/">GIFAR bug</a>.<br /><br />Google’s security team played an active role in investigating and remediating many content sniffing vulnerabilities during this period. In fact, many of the enforcement proposals were first prototyped in Chrome. Even still, the overall progress is slow; for every resolved problem, researchers discover a previously unknown flaw in another browser mechanism. Two recent examples are the Byte Order Mark (BOM) vulnerability reported to us by Masato Kinugawa, or the <a href="http://googleonlinesecurity.blogspot.com/2011/03/mhtml-vulnerability-under-active.html">MHTML attacks</a> that we have seen happening in the wild.<br /><br />For a while, we focused on content sanitization as a possible workaround - but in many cases, we found it to be insufficient. For example, Aleksandr Dobkin managed to construct a purely alphanumeric Flash applet, and in our internal work the Google security team created images that can be forced to include a particular plaintext string in their body, after being scrubbed and recoded in a deterministic way.<br /><br />In the end, we reacted to this raft of content hosting problems by placing some of the high-risk content in separate, isolated <a href="http://en.wikipedia.org/wiki/Same_origin_policy">web origins</a>—most commonly <i>*.googleusercontent.com</i>. There, the “sandboxed” files pose virtually no threat to the applications themselves, or to google.com authentication cookies. For public content, that’s all we need: we may use random or user-specific subdomains, depending on the degree of isolation required between unrelated documents, but otherwise the solution just works.<br /><br />The situation gets more interesting for non-public documents, however. Copying users’ normal authentication cookies to the “sandbox” domain would defeat the purpose. The natural alternative is to move the secret token used to confer access rights from the <i>Cookie</i> header to a value embedded in the URL, and make the token unique to every document instead of keeping it global.<br /><br />While this solution eliminates many of the <a href="http://lcamtuf.blogspot.com/2010/10/http-cookies-or-how-not-to-design.html">significant design flaws</a> associated with HTTP cookies, it trades one imperfect authentication mechanism for another. In particular, it’s important to note there are more ways to accidentally leak a capability-bearing URL than there are to accidentally leak cookies; the most notable risk is disclosure through the <i>Referer</i> header for any document format capable of including external subresources or of linking to external sites.<br /><br />In our applications, we take a risk-based approach. Generally speaking, we tend to use three strategies:<br /><ul><li>In higher risk situations (e.g. documents with elevated risk of URL disclosure), we may couple the URL token scheme with short-lived, document-specific cookies issued for specific subdomains of <i>googleusercontent.com</i>. This mechanism, known within Google as <i>FileComp</i>, relies on a range of attack mitigation strategies that are too disruptive for Google applications at large, but work well in this highly constrained use case.</li></ul><ul><li>In cases where the risk of leaks is limited but responsive access controls are preferable (e.g., embedded images), we may issue URLs bound to a specific user, or ones that expire quickly.</li></ul><ul><li>In low-risk scenarios, where usability requirements necessitate a more balanced approach, we may opt for globally valid, longer-lived URLs.</li></ul>Of course, the research into the security of web browsers continues, and the landscape of web applications is evolving rapidly. We are constantly tweaking our solutions to protect Google users even better, and even the solutions described here may change. Our commitment to making the Internet a safer place, however, will never waver.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/content-hosting-for-the-modern-web/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Safe Browsing &#8211; Protecting Web Users for 5 Years and Counting</title>
		<link>https://googledata.org/google-online-security/safe-browsing-protecting-web-users-for-5-years-and-counting/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=safe-browsing-protecting-web-users-for-5-years-and-counting</link>
		<comments>https://googledata.org/google-online-security/safe-browsing-protecting-web-users-for-5-years-and-counting/#comments</comments>
		<pubDate>Tue, 19 Jun 2012 15:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=267a896b29dc0ad16f565d95eee9feb5</guid>
		<description><![CDATA[<span>Posted by Niels Provos, Security Team</span>  <br /><br />It&#8217;s been five years since we officially announced <a href="http://googleonlinesecurity.blogspot.com/2007/05/introducing-googles-anti-malware.html">malware and phishing protection</a> via our Safe Browsing effort. The goal of Safe Browsing is still the same today as it was five years ago: to protect people from malicious content on the Internet. Today, this protection extends not only to Google&#8217;s search results and ads, but also to popular web browsers such as Chrome, Firefox and Safari.<br /><br />To achieve comprehensive and timely detection of new threats, the Safe Browsing team at Google has labored continuously to adapt to rising challenges and to build an infrastructure that automatically detects harmful content around the globe. <br /><br />For a quick sense of the scale of our effort:<br /><ul><li><b>We protect 600 million users through built-in protection for Chrome, Firefox, and Safari, where we show several million warnings every day to Internet users.</b> You may have seen our telltale red warnings pop up &#8212; when you do, please don&#8217;t go to sites we've flagged for malware or phishing. Our free and public <a href="https://developers.google.com/safe-browsing/developers_guide_v2">Safe Browsing API</a> allows other organizations to keep their users safe by using the data we&#8217;ve compiled.</li><li><b>We find about 9,500 new malicious websites every day.</b> These are either innocent websites that have been compromised by malware authors, or others that are built specifically for malware distribution or phishing. While we flag many sites daily, we strive for high quality and have had only a handful of false positives.</li><li><b>Approximately 12-14 million Google Search queries per day show our warning</b> to caution users from going to sites that are currently compromised. Once a site has been cleaned up, the warning is lifted.</li><li><b>We provide malware warnings for about 300 thousand downloads per day</b> through our <a href="http://blog.chromium.org/2012/01/all-about-safe-browsing.html">download protection service</a> for Chrome.</li><li><b>We send thousands of notifications daily to webmasters.</b> Signing up with <a href="http://googleonlinesecurity.blogspot.com/2009/10/show-me-malware.html">Webmaster Tools</a> helps us communicate directly with webmasters when we find something on their site, and our ongoing partnership with <a href="http://stopbadware.org/">StopBadware.org</a> helps webmasters who can't sign up or need additional help.</li><li><b>We also send thousands of notifications daily to Internet Service Providers (ISPs) &#38; <a href="http://en.wikipedia.org/wiki/Computer_Emergency_Response_Team">CERTs</a></b> to help them keep their networks clean. <a href="http://googleonlinesecurity.blogspot.com/2011/10/safe-browsing-alerts-for-network.html">Network administrators can sign up</a> to receive frequent alerts.</li></ul>By protecting Internet users, webmasters, ISPs, and Google over the years, we've built up a steadily more sophisticated understanding of web-based malware and phishing. These aren&#8217;t completely solvable problems because threats continue to evolve, but our technologies and processes do, too. <br /><br />From here we&#8217;ll try to hit a few highlights from our journey. <br /><br /><br /><b>Phishing</b><br /><br />Many phishers go right for the money, and that pattern is reflected in the continued heavy targeting of online commerce sites like eBay &#38; PayPal. Even though we&#8217;re still seeing some of the same techniques we first saw 5+ years ago, since they unfortunately still catch victims, phishing attacks are also getting more creative and sophisticated. As they evolve, we improve our system to catch more and newer attacks (Chart 1).  Modern attacks are:<br /><ul><li><b>Faster</b> - Many phishing webpages (URLs) remain online for less than an hour in an attempt to avoid detection.</li><li><b>More diverse</b> - Targeted &#8220;spear phishing&#8221; attacks have become increasingly common.  Additionally, phishing attacks are now targeting companies, banks, and merchants globally (Chart 2).</li><li><b>Used to distribute malware</b> - Phishing sites commonly use the look and feel of popular sites and social networks to trick users into installing malware.  For example, these rogue sites may ask to install a binary or browser extension to enable certain fake content.</li></ul><div><a href="http://1.bp.blogspot.com/-VrIyBqxOokI/T9mTxXnBkMI/AAAAAAAACSI/kVg1acMfNaw/s1600/phishing.png"><img border="0" src="http://1.bp.blogspot.com/-VrIyBqxOokI/T9mTxXnBkMI/AAAAAAAACSI/kVg1acMfNaw/s500/phishing.png" width="500"></a></div><div>(Chart 1)</div><br /><div><a href="http://3.bp.blogspot.com/-fDX_xPrOjjE/T9mUSqJ28HI/AAAAAAAACSQ/j7z5dxlc5h0/s1600/Phishing+Map.png"><img border="0" src="http://3.bp.blogspot.com/-fDX_xPrOjjE/T9mUSqJ28HI/AAAAAAAACSQ/j7z5dxlc5h0/s500/Phishing+Map.png" width="500"></a></div><div>(Chart 2)</div><br /><b>Malware </b><br /><br />Safe Browsing identifies two main categories of websites that may harm visitors:<br /><ul><li>Legitimate websites that are compromised in large numbers so they can deliver or redirect to malware (Chart 3).</li><li>Attack websites that are specifically built to distribute malware are used in increasing numbers (Chart 4).</li></ul>When a legitimate website is compromised, it&#8217;s usually modified to include content from an attack site or to redirect to an attack site. These attack sites will often deliver "<a href="http://en.wikipedia.org/wiki/Drive-by_download">Drive by downloads</a>" to visitors. A drive by download exploits a vulnerability in the browser to execute a malicious program on a user's computer without their knowledge.  <br /><br />Drive by downloads install and run a variety of malicious programs, such as:<br /><ul><li>Spyware to gather information like your banking credentials.</li><li>Malware that uses your computer to send spam.</li></ul><div><a href="http://2.bp.blogspot.com/-NdmiLOfBQpo/T9mVbbSqMcI/AAAAAAAACSY/p9B-jzuh1jA/s1600/malware-landing.png"><img border="0" src="http://2.bp.blogspot.com/-NdmiLOfBQpo/T9mVbbSqMcI/AAAAAAAACSY/p9B-jzuh1jA/s500/malware-landing.png" width="500"></a></div><div>(Chart 3)</div><br />Attack sites are purposely built for distributing malware and try to avoid detection by services such as Safe Browsing. To do so, they adopt several techniques, such as rapidly changing their location through free web hosting, dynamic DNS records, and automated generation of new domain names (Chart 4).<br /><br /><div><a href="http://1.bp.blogspot.com/-FkLw3EKPlMU/T9mV21uNfKI/AAAAAAAACSg/UjqXAgW_yuQ/s1600/malware-distribution.png"><img border="0" src="http://1.bp.blogspot.com/-FkLw3EKPlMU/T9mV21uNfKI/AAAAAAAACSg/UjqXAgW_yuQ/s500/malware-distribution.png" width="500"></a></div><div>(Chart 4)</div><br />As companies have designed browsers and plugins to be more secure over time, malware purveyors have also employed social engineering, where the malware author tries to deceive the user into installing malicious software without the need for any software vulnerabilities. A good example is a &#8220;Fake Anti-Virus&#8221; alert that masquerades as a legitimate security warning, but it actually infects computers with malware. <br /><br />While we see socially engineered attacks still trailing behind drive by downloads in frequency, this is a fast-growing category likely due to improved browser security.<br /><br /><br /><b>How can you help prevent malware and phishing?</b><br /><br />Our system is designed to protect users at high volumes (Chart 5), yet here are a few things that you can do to help:<br /><ul><li><b>Don't ignore our warnings.</b> Legitimate sites are commonly modified to contain malware or phishing threats until the webmaster has cleaned their site.  Malware is often designed to not be seen, so you won't know if your computer becomes infected. It&#8217;s best to wait for the warning to be removed before potentially exposing your machine to a harmful infection.</li><li><b>Help us find bad sites.</b> Chrome users can select the check box on the red warning page. The data sent to us helps us find bad sites more quickly and helps protect other users.</li><li><b>Register your website </b>with <a href="http://googlewebmastercentral.blogspot.com/2010/04/when-and-why-was-my-site-flagged-for.html">Google Webmaster Tools</a>. Doing so helps us inform you quickly if we find suspicious code on your website at any point.</li></ul><br /><div><a href="http://4.bp.blogspot.com/-K2DlHzze3gQ/T9mW1lMdVOI/AAAAAAAACSo/o5DjqmIqSyY/s1600/user-protection.png"><img border="0" src="http://4.bp.blogspot.com/-K2DlHzze3gQ/T9mW1lMdVOI/AAAAAAAACSo/o5DjqmIqSyY/s500/user-protection.png" width="500"></a></div><div>(Chart 5)</div><br /><b>Looking Forward</b><br /><br />The threat landscape changes rapidly. Our adversaries are highly motivated by making money from unsuspecting victims, and at great cost to everyone involved.  <br /><br />Our tangible impact in making the web more secure and our ability to directly protect users from harm has been a great source of motivation for everyone on the Safe Browsing team. We are also happy that our free data feed has become the de facto base of comparison for academic research in this space.<br /><br />As we look forward, Google continues to invest heavily in the Safe Browsing team, enabling us to counter newer forms of abuse.  In particular, our team supplied the technology underpinning these recent efforts:<br /><ul><li>Instantaneous <a href="http://googleonlinesecurity.blogspot.com/2011/04/protecting-users-from-malicious.html">phishing detection and download protection</a> within the Chrome browser</li><li>Chrome extension malware scanning</li><li>Android application protection</li></ul>For their strong efforts over the years, I thank Panayiotis Mavrommatis, Brian Ryner, Lucas Ballard, Moheeb Abu Rajab, Fabrice Jaubert, Nav Jagpal, Ian Fette, along with the whole Safe Browsing Team.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Niels Provos, Security Team</span>  <br /><br />It’s been five years since we officially announced <a href="http://googleonlinesecurity.blogspot.com/2007/05/introducing-googles-anti-malware.html">malware and phishing protection</a> via our Safe Browsing effort. The goal of Safe Browsing is still the same today as it was five years ago: to protect people from malicious content on the Internet. Today, this protection extends not only to Google’s search results and ads, but also to popular web browsers such as Chrome, Firefox and Safari.<br /><br />To achieve comprehensive and timely detection of new threats, the Safe Browsing team at Google has labored continuously to adapt to rising challenges and to build an infrastructure that automatically detects harmful content around the globe. <br /><br />For a quick sense of the scale of our effort:<br /><ul><li><b>We protect 600 million users through built-in protection for Chrome, Firefox, and Safari, where we show several million warnings every day to Internet users.</b> You may have seen our telltale red warnings pop up — when you do, please don’t go to sites we've flagged for malware or phishing. Our free and public <a href="https://developers.google.com/safe-browsing/developers_guide_v2">Safe Browsing API</a> allows other organizations to keep their users safe by using the data we’ve compiled.</li><li><b>We find about 9,500 new malicious websites every day.</b> These are either innocent websites that have been compromised by malware authors, or others that are built specifically for malware distribution or phishing. While we flag many sites daily, we strive for high quality and have had only a handful of false positives.</li><li><b>Approximately 12-14 million Google Search queries per day show our warning</b> to caution users from going to sites that are currently compromised. Once a site has been cleaned up, the warning is lifted.</li><li><b>We provide malware warnings for about 300 thousand downloads per day</b> through our <a href="http://blog.chromium.org/2012/01/all-about-safe-browsing.html">download protection service</a> for Chrome.</li><li><b>We send thousands of notifications daily to webmasters.</b> Signing up with <a href="http://googleonlinesecurity.blogspot.com/2009/10/show-me-malware.html">Webmaster Tools</a> helps us communicate directly with webmasters when we find something on their site, and our ongoing partnership with <a href="http://stopbadware.org/">StopBadware.org</a> helps webmasters who can't sign up or need additional help.</li><li><b>We also send thousands of notifications daily to Internet Service Providers (ISPs) &amp; <a href="http://en.wikipedia.org/wiki/Computer_Emergency_Response_Team">CERTs</a></b> to help them keep their networks clean. <a href="http://googleonlinesecurity.blogspot.com/2011/10/safe-browsing-alerts-for-network.html">Network administrators can sign up</a> to receive frequent alerts.</li></ul>By protecting Internet users, webmasters, ISPs, and Google over the years, we've built up a steadily more sophisticated understanding of web-based malware and phishing. These aren’t completely solvable problems because threats continue to evolve, but our technologies and processes do, too. <br /><br />From here we’ll try to hit a few highlights from our journey. <br /><br /><br /><b>Phishing</b><br /><br />Many phishers go right for the money, and that pattern is reflected in the continued heavy targeting of online commerce sites like eBay &amp; PayPal. Even though we’re still seeing some of the same techniques we first saw 5+ years ago, since they unfortunately still catch victims, phishing attacks are also getting more creative and sophisticated. As they evolve, we improve our system to catch more and newer attacks (Chart 1).  Modern attacks are:<br /><ul><li><b>Faster</b> - Many phishing webpages (URLs) remain online for less than an hour in an attempt to avoid detection.</li><li><b>More diverse</b> - Targeted “spear phishing” attacks have become increasingly common.  Additionally, phishing attacks are now targeting companies, banks, and merchants globally (Chart 2).</li><li><b>Used to distribute malware</b> - Phishing sites commonly use the look and feel of popular sites and social networks to trick users into installing malware.  For example, these rogue sites may ask to install a binary or browser extension to enable certain fake content.</li></ul><div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/-VrIyBqxOokI/T9mTxXnBkMI/AAAAAAAACSI/kVg1acMfNaw/s1600/phishing.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-VrIyBqxOokI/T9mTxXnBkMI/AAAAAAAACSI/kVg1acMfNaw/s500/phishing.png" width="500" /></a></div><div style="text-align: center;">(Chart 1)</div><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-fDX_xPrOjjE/T9mUSqJ28HI/AAAAAAAACSQ/j7z5dxlc5h0/s1600/Phishing+Map.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-fDX_xPrOjjE/T9mUSqJ28HI/AAAAAAAACSQ/j7z5dxlc5h0/s500/Phishing+Map.png" width="500" /></a></div><div style="text-align: center;">(Chart 2)</div><br /><b>Malware </b><br /><br />Safe Browsing identifies two main categories of websites that may harm visitors:<br /><ul><li>Legitimate websites that are compromised in large numbers so they can deliver or redirect to malware (Chart 3).</li><li>Attack websites that are specifically built to distribute malware are used in increasing numbers (Chart 4).</li></ul>When a legitimate website is compromised, it’s usually modified to include content from an attack site or to redirect to an attack site. These attack sites will often deliver "<a href="http://en.wikipedia.org/wiki/Drive-by_download">Drive by downloads</a>" to visitors. A drive by download exploits a vulnerability in the browser to execute a malicious program on a user's computer without their knowledge.  <br /><br />Drive by downloads install and run a variety of malicious programs, such as:<br /><ul><li>Spyware to gather information like your banking credentials.</li><li>Malware that uses your computer to send spam.</li></ul><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-NdmiLOfBQpo/T9mVbbSqMcI/AAAAAAAACSY/p9B-jzuh1jA/s1600/malware-landing.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-NdmiLOfBQpo/T9mVbbSqMcI/AAAAAAAACSY/p9B-jzuh1jA/s500/malware-landing.png" width="500" /></a></div><div style="text-align: center;">(Chart 3)</div><br />Attack sites are purposely built for distributing malware and try to avoid detection by services such as Safe Browsing. To do so, they adopt several techniques, such as rapidly changing their location through free web hosting, dynamic DNS records, and automated generation of new domain names (Chart 4).<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/-FkLw3EKPlMU/T9mV21uNfKI/AAAAAAAACSg/UjqXAgW_yuQ/s1600/malware-distribution.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-FkLw3EKPlMU/T9mV21uNfKI/AAAAAAAACSg/UjqXAgW_yuQ/s500/malware-distribution.png" width="500" /></a></div><div style="text-align: center;">(Chart 4)</div><br />As companies have designed browsers and plugins to be more secure over time, malware purveyors have also employed social engineering, where the malware author tries to deceive the user into installing malicious software without the need for any software vulnerabilities. A good example is a “Fake Anti-Virus” alert that masquerades as a legitimate security warning, but it actually infects computers with malware. <br /><br />While we see socially engineered attacks still trailing behind drive by downloads in frequency, this is a fast-growing category likely due to improved browser security.<br /><br /><br /><b>How can you help prevent malware and phishing?</b><br /><br />Our system is designed to protect users at high volumes (Chart 5), yet here are a few things that you can do to help:<br /><ul><li><b>Don't ignore our warnings.</b> Legitimate sites are commonly modified to contain malware or phishing threats until the webmaster has cleaned their site.  Malware is often designed to not be seen, so you won't know if your computer becomes infected. It’s best to wait for the warning to be removed before potentially exposing your machine to a harmful infection.</li><li><b>Help us find bad sites.</b> Chrome users can select the check box on the red warning page. The data sent to us helps us find bad sites more quickly and helps protect other users.</li><li><b>Register your website </b>with <a href="http://googlewebmastercentral.blogspot.com/2010/04/when-and-why-was-my-site-flagged-for.html">Google Webmaster Tools</a>. Doing so helps us inform you quickly if we find suspicious code on your website at any point.</li></ul><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://4.bp.blogspot.com/-K2DlHzze3gQ/T9mW1lMdVOI/AAAAAAAACSo/o5DjqmIqSyY/s1600/user-protection.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-K2DlHzze3gQ/T9mW1lMdVOI/AAAAAAAACSo/o5DjqmIqSyY/s500/user-protection.png" width="500" /></a></div><div style="text-align: center;">(Chart 5)</div><br /><b>Looking Forward</b><br /><br />The threat landscape changes rapidly. Our adversaries are highly motivated by making money from unsuspecting victims, and at great cost to everyone involved.  <br /><br />Our tangible impact in making the web more secure and our ability to directly protect users from harm has been a great source of motivation for everyone on the Safe Browsing team. We are also happy that our free data feed has become the de facto base of comparison for academic research in this space.<br /><br />As we look forward, Google continues to invest heavily in the Safe Browsing team, enabling us to counter newer forms of abuse.  In particular, our team supplied the technology underpinning these recent efforts:<br /><ul><li>Instantaneous <a href="http://googleonlinesecurity.blogspot.com/2011/04/protecting-users-from-malicious.html">phishing detection and download protection</a> within the Chrome browser</li><li>Chrome extension malware scanning</li><li>Android application protection</li></ul>For their strong efforts over the years, I thank Panayiotis Mavrommatis, Brian Ryner, Lucas Ballard, Moheeb Abu Rajab, Fabrice Jaubert, Nav Jagpal, Ian Fette, along with the whole Safe Browsing Team.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/safe-browsing-protecting-web-users-for-5-years-and-counting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Microsoft XML vulnerability under active exploitation</title>
		<link>https://googledata.org/google-online-security/microsoft-xml-vulnerability-under-active-exploitation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=microsoft-xml-vulnerability-under-active-exploitation</link>
		<comments>https://googledata.org/google-online-security/microsoft-xml-vulnerability-under-active-exploitation/#comments</comments>
		<pubDate>Tue, 12 Jun 2012 19:53:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=5516495b925195412b91443a726ad26d</guid>
		<description><![CDATA[<span>Posted by Andrew Lyons, Security Engineer</span><br /><br />Today Microsoft issued a <a href="http://technet.microsoft.com/en-us/security/advisory/2719615">Security Advisory</a> describing a vulnerability in the Microsoft XML component. We discovered this vulnerability&#8212;which is leveraged via an uninitialized variable&#8212;being actively exploited in the wild for targeted attacks, and we reported it to Microsoft on May 30th. Over the past two weeks, Microsoft has been responsive to the issue and has been working with us. These attacks are being distributed both via malicious web pages intended for Internet Explorer users and through Office documents. Users running Windows XP up to and including Windows 7 are known to be vulnerable.<br /><br />As part of the advisory, Microsoft suggests installing a <a href="http://support.microsoft.com/kb/2719615">Fix it solution</a> that will prevent the exploitation of this vulnerability. We strongly recommend Internet Explorer and Microsoft Office users immediately install the Fix it while Microsoft develops and publishes a final fix as part of a future advisory.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Andrew Lyons, Security Engineer</span><br /><br />Today Microsoft issued a <a href="http://technet.microsoft.com/en-us/security/advisory/2719615">Security Advisory</a> describing a vulnerability in the Microsoft XML component. We discovered this vulnerability—which is leveraged via an uninitialized variable—being actively exploited in the wild for targeted attacks, and we reported it to Microsoft on May 30th. Over the past two weeks, Microsoft has been responsive to the issue and has been working with us. These attacks are being distributed both via malicious web pages intended for Internet Explorer users and through Office documents. Users running Windows XP up to and including Windows 7 are known to be vulnerable.<br /><br />As part of the advisory, Microsoft suggests installing a <a href="http://support.microsoft.com/kb/2719615">Fix it solution</a> that will prevent the exploitation of this vulnerability. We strongly recommend Internet Explorer and Microsoft Office users immediately install the Fix it while Microsoft develops and publishes a final fix as part of a future advisory.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/microsoft-xml-vulnerability-under-active-exploitation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Security warnings for suspected state-sponsored attacks</title>
		<link>https://googledata.org/google-online-security/security-warnings-for-suspected-state-sponsored-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=security-warnings-for-suspected-state-sponsored-attacks</link>
		<comments>https://googledata.org/google-online-security/security-warnings-for-suspected-state-sponsored-attacks/#comments</comments>
		<pubDate>Tue, 05 Jun 2012 19:04:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=fb5c8ed69b6ceb55584bed0a2ef67049</guid>
		<description><![CDATA[<span>Posted by Eric Grosse, VP Security Engineering</span><br /><br />We are constantly on the lookout for malicious activity on our systems, in particular attempts by third parties to log into users&#8217; accounts unauthorized. When we have specific intelligence&#8212;either directly from users or from our own monitoring efforts&#8212;we show clear warning signs and put in place extra roadblocks to thwart these bad actors.<br /><br />Today, we&#8217;re taking that a step further for a subset of our users, who we believe may be the target of state-sponsored attacks. You can see what this new warning looks like here:<br /><br /><div><a href="http://4.bp.blogspot.com/-kaEkDHuMR-8/T85THToQyYI/AAAAAAAACQg/O0-Pi2OdUeY/s1600/Targeted+User+Warning.png"><img border="0" src="http://4.bp.blogspot.com/-kaEkDHuMR-8/T85THToQyYI/AAAAAAAACQg/O0-Pi2OdUeY/s500/Targeted+User+Warning.png" width="500"></a></div><br /><br />If you see this warning it does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account. Here are some things you should do immediately: create a unique password that has a good mix of capital and lowercase letters, as well punctuation marks and numbers; enable 2-step verification as additional security; and update your browser, operating system, plugins, and document editors. Attackers often send links to fake sign-in pages to try to steal your password, so be careful about where you sign in to Google and look for <i>https://accounts.google.com/</i> in your browser bar. These warnings are not being shown because Google&#8217;s internal systems have been compromised or because of a particular attack.  <br /><br />You might ask how we know this activity is state-sponsored. We can&#8217;t go into the details without giving away information that would be helpful to these bad actors, but our detailed analysis&#8212;as well as victim reports&#8212;strongly suggest the involvement of states or groups that are state-sponsored.<br /><br />We believe it is our duty to be proactive in notifying users about attacks or potential attacks so that they can take action to protect their information. And we will continue to update these notifications based on the latest information.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Eric Grosse, VP Security Engineering</span><br /><br />We are constantly on the lookout for malicious activity on our systems, in particular attempts by third parties to log into users’ accounts unauthorized. When we have specific intelligence—either directly from users or from our own monitoring efforts—we show clear warning signs and put in place extra roadblocks to thwart these bad actors.<br /><br />Today, we’re taking that a step further for a subset of our users, who we believe may be the target of state-sponsored attacks. You can see what this new warning looks like here:<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://4.bp.blogspot.com/-kaEkDHuMR-8/T85THToQyYI/AAAAAAAACQg/O0-Pi2OdUeY/s1600/Targeted+User+Warning.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-kaEkDHuMR-8/T85THToQyYI/AAAAAAAACQg/O0-Pi2OdUeY/s500/Targeted+User+Warning.png" width="500" /></a></div><br /><br />If you see this warning it does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account. Here are some things you should do immediately: create a unique password that has a good mix of capital and lowercase letters, as well punctuation marks and numbers; enable 2-step verification as additional security; and update your browser, operating system, plugins, and document editors. Attackers often send links to fake sign-in pages to try to steal your password, so be careful about where you sign in to Google and look for <i>https://accounts.google.com/</i> in your browser bar. These warnings are not being shown because Google’s internal systems have been compromised or because of a particular attack.  <br /><br />You might ask how we know this activity is state-sponsored. We can’t go into the details without giving away information that would be helpful to these bad actors, but our detailed analysis—as well as victim reports—strongly suggest the involvement of states or groups that are state-sponsored.<br /><br />We believe it is our duty to be proactive in notifying users about attacks or potential attacks so that they can take action to protect their information. And we will continue to update these notifications based on the latest information.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/security-warnings-for-suspected-state-sponsored-attacks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Notifying users affected by the DNSChanger malware</title>
		<link>https://googledata.org/google-online-security/notifying-users-affected-by-the-dnschanger-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=notifying-users-affected-by-the-dnschanger-malware</link>
		<comments>https://googledata.org/google-online-security/notifying-users-affected-by-the-dnschanger-malware/#comments</comments>
		<pubDate>Tue, 22 May 2012 19:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=5d6f482a4538d3882a7348773b625fa4</guid>
		<description><![CDATA[<span>Posted by Damian Menscher, Security Engineer</span><br /><br />Starting today we&#8217;re undertaking an effort to notify roughly half a million people whose computers or home routers are infected with a well-publicized form of malware known as DNSChanger. After successfully alerting a million users <a href="http://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html">last summer</a> to a different type of malware, we&#8217;ve replicated this method and have started showing warnings via a special message that will appear at the top of the Google search results page for users with affected devices.<br /><br /><div><a href="http://4.bp.blogspot.com/-EY9pz56oz_4/T7vgXYng_GI/AAAAAAAACHQ/aJ5P94lR3eo/s1600/DNSChanger+warning.png"><img border="0" src="http://4.bp.blogspot.com/-EY9pz56oz_4/T7vgXYng_GI/AAAAAAAACHQ/aJ5P94lR3eo/s500/DNSChanger+warning.png" width="500"></a></div><br />The <a href="http://en.wikipedia.org/wiki/Domain_Name_System">Domain Name System</a> (DNS) translates familiar web address names like google.com into a numerical address that computers use to send traffic to the right place. The DNSChanger malware modifies DNS settings to use malicious servers that point users to fake sites and other harmful locations. DNSChanger attempts to modify the settings on home routers as well, meaning other computers and mobile devices may also be affected.<br /><br />Since the FBI and Estonian law enforcement arrested a group of people and transferred control of the rogue DNS servers to the Internet Systems Consortium in November 2011, various ISPs and other groups have attempted to alert victims. However, many of these campaigns have had limited success because they could not target the affected users, or did not appear in the user&#8217;s preferred language (only half the affected users speak English as their primary language). At the current disinfection rate hundreds of thousands of devices will still be infected when the court order expires on July 9th and the replacement DNS servers are shut down. At that time, any remaining infected machines may experience slowdowns or completely lose Internet access.<br /><br />Our goal with this notification is to raise awareness of DNSChanger among affected users. We believe directly messaging affected users on a trusted site and in their preferred language will produce the best possible results. While we expect to notify over 500,000 users within a week, we realize we won&#8217;t reach every affected user. Some ISPs have been taking their own actions, a few of which will prevent our warning from being displayed on affected devices. We also can&#8217;t guarantee that our recommendations will always clean infected devices completely, so some users may need to seek additional help. These conditions aside, if more devices are cleaned and steps are taken to better secure the machines against further abuse, the notification effort will be well worth it.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Damian Menscher, Security Engineer</span><br /><br />Starting today we’re undertaking an effort to notify roughly half a million people whose computers or home routers are infected with a well-publicized form of malware known as DNSChanger. After successfully alerting a million users <a href="http://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html">last summer</a> to a different type of malware, we’ve replicated this method and have started showing warnings via a special message that will appear at the top of the Google search results page for users with affected devices.<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://4.bp.blogspot.com/-EY9pz56oz_4/T7vgXYng_GI/AAAAAAAACHQ/aJ5P94lR3eo/s1600/DNSChanger+warning.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-EY9pz56oz_4/T7vgXYng_GI/AAAAAAAACHQ/aJ5P94lR3eo/s500/DNSChanger+warning.png" width="500" /></a></div><br />The <a href="http://en.wikipedia.org/wiki/Domain_Name_System">Domain Name System</a> (DNS) translates familiar web address names like google.com into a numerical address that computers use to send traffic to the right place. The DNSChanger malware modifies DNS settings to use malicious servers that point users to fake sites and other harmful locations. DNSChanger attempts to modify the settings on home routers as well, meaning other computers and mobile devices may also be affected.<br /><br />Since the FBI and Estonian law enforcement arrested a group of people and transferred control of the rogue DNS servers to the Internet Systems Consortium in November 2011, various ISPs and other groups have attempted to alert victims. However, many of these campaigns have had limited success because they could not target the affected users, or did not appear in the user’s preferred language (only half the affected users speak English as their primary language). At the current disinfection rate hundreds of thousands of devices will still be infected when the court order expires on July 9th and the replacement DNS servers are shut down. At that time, any remaining infected machines may experience slowdowns or completely lose Internet access.<br /><br />Our goal with this notification is to raise awareness of DNSChanger among affected users. We believe directly messaging affected users on a trusted site and in their preferred language will produce the best possible results. While we expect to notify over 500,000 users within a week, we realize we won’t reach every affected user. Some ISPs have been taking their own actions, a few of which will prevent our warning from being displayed on affected devices. We also can’t guarantee that our recommendations will always clean infected devices completely, so some users may need to seek additional help. These conditions aside, if more devices are cleaned and steps are taken to better secure the machines against further abuse, the notification effort will be well worth it.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/notifying-users-affected-by-the-dnschanger-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Spurring more vulnerability research through increased rewards</title>
		<link>https://googledata.org/google-online-security/spurring-more-vulnerability-research-through-increased-rewards/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=spurring-more-vulnerability-research-through-increased-rewards</link>
		<comments>https://googledata.org/google-online-security/spurring-more-vulnerability-research-through-increased-rewards/#comments</comments>
		<pubDate>Mon, 23 Apr 2012 18:30:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=9f4e536a75f89daa0fe340acf7f66e0a</guid>
		<description><![CDATA[<span>Posted by Adam Mein and Michal Zalewski, Security Team</span><br /><br />We <a href="http://googleonlinesecurity.blogspot.com/2012/02/celebrating-one-year-of-web.html">recently marked</a> the anniversary of our <a href="http://www.google.com/about/company/rewardprogram.html">Vulnerability Reward Program</a>, possibly the first permanent program of its kind for web properties. This collaboration with the security research community has far surpassed our expectations: we have received over 780 qualifying vulnerability reports that span across the hundreds of Google-developed services, as well as the software written by fifty or so companies that we have acquired. In just over a year, the program paid out around $460,000 to roughly 200 individuals. We&#8217;re confident beyond any doubt the program has made Google users safer.<br /><br />Today, to celebrate the success of this effort and to underscore our commitment to security, we are rolling out <a href="http://www.google.com/about/company/rewardprogram.html">updated rules</a> for our program &#8212; including new reward amounts for critical bugs:<br /><ul><li><b>$20,000</b> for qualifying vulnerabilities that the reward panel determines will allow code execution on our production systems.&#160;</li></ul><ul><li><b>$10,000</b> for SQL injection and equivalent vulnerabilities; and for certain types of information disclosure, authentication, and authorization bypass bugs.&#160;</li></ul><ul><li>Up to <b>$3,133.7</b> for many types of XSS, XSRF, and other high-impact flaws in highly sensitive applications.&#160;</li></ul>To help focus the research on bringing the greatest benefit to our users, the new rules offer reduced rewards for vulnerabilities discovered in non-integrated acquisitions and for lower risk issues. For example, while every flaw deserves appropriate attention, we are likely to issue a higher reward for a cross-site scripting vulnerability in <a href="http://www.google.com/wallet/">Google Wallet</a> than one in <a href="http://www.googleartproject.com/">Google Art Project</a>, where the potential risk to user data is significantly smaller.<br /><br />Happy hunting - and if you find a security problem, please <a href="mailto:security@google.com">let us know</a>!]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Adam Mein and Michal Zalewski, Security Team</span><br /><br />We <a href="http://googleonlinesecurity.blogspot.com/2012/02/celebrating-one-year-of-web.html">recently marked</a> the anniversary of our <a href="http://www.google.com/about/company/rewardprogram.html">Vulnerability Reward Program</a>, possibly the first permanent program of its kind for web properties. This collaboration with the security research community has far surpassed our expectations: we have received over 780 qualifying vulnerability reports that span across the hundreds of Google-developed services, as well as the software written by fifty or so companies that we have acquired. In just over a year, the program paid out around $460,000 to roughly 200 individuals. We’re confident beyond any doubt the program has made Google users safer.<br /><br />Today, to celebrate the success of this effort and to underscore our commitment to security, we are rolling out <a href="http://www.google.com/about/company/rewardprogram.html">updated rules</a> for our program — including new reward amounts for critical bugs:<br /><ul><li><b>$20,000</b> for qualifying vulnerabilities that the reward panel determines will allow code execution on our production systems.&nbsp;</li></ul><ul><li><b>$10,000</b> for SQL injection and equivalent vulnerabilities; and for certain types of information disclosure, authentication, and authorization bypass bugs.&nbsp;</li></ul><ul><li>Up to <b>$3,133.7</b> for many types of XSS, XSRF, and other high-impact flaws in highly sensitive applications.&nbsp;</li></ul>To help focus the research on bringing the greatest benefit to our users, the new rules offer reduced rewards for vulnerabilities discovered in non-integrated acquisitions and for lower risk issues. For example, while every flaw deserves appropriate attention, we are likely to issue a higher reward for a cross-site scripting vulnerability in <a href="http://www.google.com/wallet/">Google Wallet</a> than one in <a href="http://www.googleartproject.com/">Google Art Project</a>, where the potential risk to user data is significantly smaller.<br /><br />Happy hunting - and if you find a security problem, please <a href="mailto:security@google.com">let us know</a>!]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/spurring-more-vulnerability-research-through-increased-rewards/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>An improved Google Authenticator app to celebrate millions of 2-step verification users</title>
		<link>https://googledata.org/google-online-security/an-improved-google-authenticator-app-to-celebrate-millions-of-2-step-verification-users/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=an-improved-google-authenticator-app-to-celebrate-millions-of-2-step-verification-users</link>
		<comments>https://googledata.org/google-online-security/an-improved-google-authenticator-app-to-celebrate-millions-of-2-step-verification-users/#comments</comments>
		<pubDate>Fri, 30 Mar 2012 15:56:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=42d856c3ca1c01af3642dea7c07ca9ea</guid>
		<description><![CDATA[<span>Posted by Sara "Scout" Sinclair, Associate Product Manager, Google Security Team</span><br /><br />Since we first made 2-step verification available to <a href="http://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html">all Google users</a> in February of 2011, millions of people around the world have chosen to use this extra layer of security to protect their Google Accounts. Thousands more are signing up every day. And recently, we updated the feature&#8217;s companion smartphone app, <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2">Google Authenticator</a>, for Android users.<br /><br />2-step verification works by requiring users to enter a verification code when signing in using a computer they haven&#8217;t previously marked as &#8220;<a href="http://support.google.com/accounts/bin/answer.py?hl=en&#38;topic=1099586&#38;answer=2544838">trusted</a>.&#8221; Many users choose to receive their codes via SMS or voice call, but smartphone users also have the option to generate codes on their phone by <a href="http://support.google.com/accounts/bin/answer.py?hl=en&#38;answer=1066447">installing the Google Authenticator app</a> &#8212; an option that is particularly useful while traveling, or where cellular coverage is unreliable. You can use Google Authenticator to generate a valid code even when your phone isn&#8217;t connected to a cellular or data network.<br /><br />We want 2-step verification to be simple to use, and therefore we are working continually to make it easier for users to sign up, manage their settings, and maintain easy access to their verification codes at any time and from anywhere. Our updated Google Authenticator app has an improved look-and-feel, as well as fundamental upgrades to the back-end security and infrastructure that necessitated the migration to a new app. Future improvements, however, will use the familiar Android update procedure.<br /><br />Current Google Authenticator users will be prompted to upgrade to the new version when they launch the app. We&#8217;ve worked hard to make the upgrade process as smooth as possible, but if you have questions please refer to the <a href="http://support.google.com/accounts/bin/answer.py?hl=en&#38;topic=1099586&#38;answer=2544996">Help Center article</a> for more information. And, if you aren&#8217;t already a 2-step verification user, we encourage you to <a href="https://accounts.google.com/SmsAuthConfig">give it a try</a>.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Sara "Scout" Sinclair, Associate Product Manager, Google Security Team</span><br /><br />Since we first made 2-step verification available to <a href="http://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html">all Google users</a> in February of 2011, millions of people around the world have chosen to use this extra layer of security to protect their Google Accounts. Thousands more are signing up every day. And recently, we updated the feature’s companion smartphone app, <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2">Google Authenticator</a>, for Android users.<br /><br />2-step verification works by requiring users to enter a verification code when signing in using a computer they haven’t previously marked as “<a href="http://support.google.com/accounts/bin/answer.py?hl=en&amp;topic=1099586&amp;answer=2544838">trusted</a>.” Many users choose to receive their codes via SMS or voice call, but smartphone users also have the option to generate codes on their phone by <a href="http://support.google.com/accounts/bin/answer.py?hl=en&amp;answer=1066447">installing the Google Authenticator app</a> — an option that is particularly useful while traveling, or where cellular coverage is unreliable. You can use Google Authenticator to generate a valid code even when your phone isn’t connected to a cellular or data network.<br /><br />We want 2-step verification to be simple to use, and therefore we are working continually to make it easier for users to sign up, manage their settings, and maintain easy access to their verification codes at any time and from anywhere. Our updated Google Authenticator app has an improved look-and-feel, as well as fundamental upgrades to the back-end security and infrastructure that necessitated the migration to a new app. Future improvements, however, will use the familiar Android update procedure.<br /><br />Current Google Authenticator users will be prompted to upgrade to the new version when they launch the app. We’ve worked hard to make the upgrade process as smooth as possible, but if you have questions please refer to the <a href="http://support.google.com/accounts/bin/answer.py?hl=en&amp;topic=1099586&amp;answer=2544996">Help Center article</a> for more information. And, if you aren’t already a 2-step verification user, we encourage you to <a href="https://accounts.google.com/SmsAuthConfig">give it a try</a>.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/an-improved-google-authenticator-app-to-celebrate-millions-of-2-step-verification-users/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Celebrating one year of web vulnerability research</title>
		<link>https://googledata.org/google-online-security/celebrating-one-year-of-web-vulnerability-research/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=celebrating-one-year-of-web-vulnerability-research</link>
		<comments>https://googledata.org/google-online-security/celebrating-one-year-of-web-vulnerability-research/#comments</comments>
		<pubDate>Thu, 09 Feb 2012 17:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=f2e1cf21a1ab19431bcf154a1e1396a6</guid>
		<description><![CDATA[<span>Posted by Adam Mein, Technical Program Manager, Google Security Team</span><br /><br />In November 2010, we <a href="http://googleonlinesecurity.blogspot.com/2010/11/rewarding-web-application-security.html">introduced</a> a different kind of vulnerability reward program that encourages people to find and report security bugs in Google&#8217;s web applications. By all available measures, the program has been a big success. Before we embark further, we wanted to pause and share a few things that we&#8217;ve learned from the experience.<br /><br /><i>&#8220;Bug bounty&#8221; programs open up vulnerability research to wider participation.</i><br /><br />On the morning of our announcement of the program last November, several of us guessed how many valid reports we might see during the first week. Thanks to an already successful <a href="http://blog.chromium.org/2012/02/expanding-chromium-security-rewards.html">Chromium reward program</a> and a healthy stream of regular contributions to our <a href="http://www.google.com/intl/en/about/corporate/company/security.html">general security submissions</a> queue, most estimates settled around 10 or so. At the end of the first week, we ended up with 43 bug reports. Over the course of the program, we&#8217;ve seen more than 1100 legitimate issues (ranging from low severity to higher) <a href="http://www.google.com/about/corporate/company/halloffame.html">reported by over 200 individuals</a>, with 730 of those bugs qualifying for a reward. Roughly half of the bugs that received a reward were discovered in software written by approximately 50 companies that Google acquired; the rest were distributed across applications developed by Google (several hundred new ones each year). Significantly, the vast majority of our initial bug reporters had never filed bugs with us before we started offering monetary rewards.<br /><br /><i>Developing quality bug reports pays off... for everyone.</i><br /><br />A well-run vulnerability reward program attracts high quality reports, and we&#8217;ve seen a whole lot of them. To date we&#8217;ve paid out over $410,000 for web app vulnerabilities to directly support researchers and their efforts. Thanks to the generosity of these bug reporters, we have also donated $19,000 to charities of their choice. It&#8217;s not all about money, though. Google has gotten better and stronger as a result of this work. We get more bug reports, which means we get more bug fixes, which means a safer experience for our users.<br /><br /><i>Bug bounties &#8212; the more, the merrier!</i><br /><br />We benefited from looking at <a href="http://www.mozilla.org/security/bug-bounty.html">examples</a> of other types of vulnerability reward programs when designing our own. Similarly, in the months following our reward program kick-off, we saw <a href="http://www.barracudanetworks.com/ns/news_and_events/index.php?nid=423">other</a> <a href="http://www.facebook.com/whitehat/bounty/">companies</a> developing reward programs and starting to <a href="http://blog.mozilla.com/security/2010/12/14/adding-web-applications-to-the-security-bug-bounty-program/">focus more on web properties</a>. Over time, these programs can help companies build better relationships with the security research community. As the model replicates, the opportunity to improve the overall security of the web broadens.<br /><br />And with that, we turn toward the year ahead. We&#8217;re looking forward to new reports and ongoing relationships with the researchers who are helping make Google products more secure.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Adam Mein, Technical Program Manager, Google Security Team</span><br /><br />In November 2010, we <a href="http://googleonlinesecurity.blogspot.com/2010/11/rewarding-web-application-security.html">introduced</a> a different kind of vulnerability reward program that encourages people to find and report security bugs in Google’s web applications. By all available measures, the program has been a big success. Before we embark further, we wanted to pause and share a few things that we’ve learned from the experience.<br /><br /><i>“Bug bounty” programs open up vulnerability research to wider participation.</i><br /><br />On the morning of our announcement of the program last November, several of us guessed how many valid reports we might see during the first week. Thanks to an already successful <a href="http://blog.chromium.org/2012/02/expanding-chromium-security-rewards.html">Chromium reward program</a> and a healthy stream of regular contributions to our <a href="http://www.google.com/intl/en/about/corporate/company/security.html">general security submissions</a> queue, most estimates settled around 10 or so. At the end of the first week, we ended up with 43 bug reports. Over the course of the program, we’ve seen more than 1100 legitimate issues (ranging from low severity to higher) <a href="http://www.google.com/about/corporate/company/halloffame.html">reported by over 200 individuals</a>, with 730 of those bugs qualifying for a reward. Roughly half of the bugs that received a reward were discovered in software written by approximately 50 companies that Google acquired; the rest were distributed across applications developed by Google (several hundred new ones each year). Significantly, the vast majority of our initial bug reporters had never filed bugs with us before we started offering monetary rewards.<br /><br /><i>Developing quality bug reports pays off... for everyone.</i><br /><br />A well-run vulnerability reward program attracts high quality reports, and we’ve seen a whole lot of them. To date we’ve paid out over $410,000 for web app vulnerabilities to directly support researchers and their efforts. Thanks to the generosity of these bug reporters, we have also donated $19,000 to charities of their choice. It’s not all about money, though. Google has gotten better and stronger as a result of this work. We get more bug reports, which means we get more bug fixes, which means a safer experience for our users.<br /><br /><i>Bug bounties — the more, the merrier!</i><br /><br />We benefited from looking at <a href="http://www.mozilla.org/security/bug-bounty.html">examples</a> of other types of vulnerability reward programs when designing our own. Similarly, in the months following our reward program kick-off, we saw <a href="http://www.barracudanetworks.com/ns/news_and_events/index.php?nid=423">other</a> <a href="http://www.facebook.com/whitehat/bounty/">companies</a> developing reward programs and starting to <a href="http://blog.mozilla.com/security/2010/12/14/adding-web-applications-to-the-security-bug-bounty-program/">focus more on web properties</a>. Over time, these programs can help companies build better relationships with the security research community. As the model replicates, the opportunity to improve the overall security of the web broadens.<br /><br />And with that, we turn toward the year ahead. We’re looking forward to new reports and ongoing relationships with the researchers who are helping make Google products more secure.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/celebrating-one-year-of-web-vulnerability-research/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Android and Security</title>
		<link>https://googledata.org/google-online-security/android-and-security-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=android-and-security-2</link>
		<comments>https://googledata.org/google-online-security/android-and-security-2/#comments</comments>
		<pubDate>Thu, 02 Feb 2012 20:29:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=6bdd0a5fe8451f71b0f0332a71d10db5</guid>
		<description><![CDATA[<span>Posted by Adrian Ludwig, Android Security Engineer</span><br /><br />We frequently get asked about how we defend Android users from malware and other threats. As the Android platform continues its tremendous growth, people wonder how we can maintain a trustworthy experience with Android Market while preserving the openness that remains a hallmark of our overall approach. We&#8217;ve been working on lots of defenses, and they have already made a real and measurable difference for our users&#8217; security. Read more about how we defend against malware in Android Market on the Google Mobile Blog <a href="http://googlemobile.blogspot.com/2012/02/android-and-security.html">here</a>.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Adrian Ludwig, Android Security Engineer</span><br /><br />We frequently get asked about how we defend Android users from malware and other threats. As the Android platform continues its tremendous growth, people wonder how we can maintain a trustworthy experience with Android Market while preserving the openness that remains a hallmark of our overall approach. We’ve been working on lots of defenses, and they have already made a real and measurable difference for our users’ security. Read more about how we defend against malware in Android Market on the Google Mobile Blog <a href="http://googlemobile.blogspot.com/2012/02/android-and-security.html">here</a>.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/android-and-security-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Landing another blow against email phishing</title>
		<link>https://googledata.org/google-online-security/landing-another-blow-against-email-phishing-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=landing-another-blow-against-email-phishing-2</link>
		<comments>https://googledata.org/google-online-security/landing-another-blow-against-email-phishing-2/#comments</comments>
		<pubDate>Mon, 30 Jan 2012 05:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=5b517cb61db02605502cc15d591f809f</guid>
		<description><![CDATA[<div><span><i>(Cross-posted from the <a href="http://gmailblog.blogspot.com/2012/01/landing-another-blow-against-email.html">Gmail Blog</a>)</i></span></div><span><div><span><br /></span></div>Posted by Adam Dawes, Product Manager</span><br /><br />Email phishing, in which someone tries to trick you into revealing personal information by sending fake emails that look legitimate, remains one of the biggest online threats. One of the most popular methods that scammers employ is something called <a href="http://support.google.com/mail/bin/answer.py?hl=en&#38;answer=50200">domain spoofing</a>. With this technique, someone sends a message that seems legitimate when you look at the &#8220;From&#8221; line even though it&#8217;s actually a fake. Email phishing is costing regular people and companies millions of dollars each year, if not more, and in response, Google and other companies have been talking about how we can move beyond the solutions we&#8217;ve developed individually over the years to make a real difference for the whole email industry.<br /><br />Industry groups come and go, and it&#8217;s not always easy to tell at the beginning which ones are actually going to generate good solutions. When the right contributors come together to solve real problems, though, real things happen. That&#8217;s why we&#8217;re particularly optimistic about <a href="http://www.dmarc.org/news/press_release_20120130.html">today&#8217;s announcement</a> of DMARC.org, a passionate collection of companies focused on significantly cutting down on email phishing and other malicious mail.<br /><br />Building upon the work of previous mail authentication standards like <a href="http://en.wikipedia.org/wiki/Sender_Policy_Framework">SPF</a> and <a href="http://www.dkim.org/">DKIM</a>, DMARC is responding to domain spoofing and other phishing methods by creating a standard protocol by which we&#8217;ll be able to measure and enforce the authenticity of emails. With DMARC, large email senders can ensure that the email they send is being recognized by mail providers like Gmail as legitimate, as well as set policies so that mail providers can reject messages that try to spoof the senders&#8217; addresses.<br /><br />We&#8217;ve been active in the leadership of the DMARC group for almost two years, and now that Gmail and several other large mail senders and providers &#8212; namely Facebook, LinkedIn, and PayPal &#8212; are actively using the DMARC specification, the road is paved for more members of the email ecosystem to start getting a handle on phishing. Our recent data indicates that roughly 15% of non-spam messages in Gmail are already coming from domains protected by DMARC, which means Gmail users like you don&#8217;t need to worry about spoofed messages from these senders. The phishing potential plummets when the system just works, and that&#8217;s what DMARC provides.<br /><br />If you&#8217;re a large email sender and you want to try out the DMARC specification, you can learn more at the <a href="http://www.dmarc.org/">DMARC website</a>. Even if you&#8217;re not ready to take on the challenge of authenticating all your outbound mail just yet, there&#8217;s no reason to not sign up to start receiving reports of mail that fraudulently claims to originate from your address. With further adoption of DMARC, we can all look forward to a more trustworthy overall experience with email.]]></description>
				<content:encoded><![CDATA[<div><span class="byline-author"><i>(Cross-posted from the <a href="http://gmailblog.blogspot.com/2012/01/landing-another-blow-against-email.html">Gmail Blog</a>)</i></span></div><span class="byline-author"><div><span class="byline-author"><br /></span></div>Posted by Adam Dawes, Product Manager</span><br /><br />Email phishing, in which someone tries to trick you into revealing personal information by sending fake emails that look legitimate, remains one of the biggest online threats. One of the most popular methods that scammers employ is something called <a href="http://support.google.com/mail/bin/answer.py?hl=en&amp;answer=50200">domain spoofing</a>. With this technique, someone sends a message that seems legitimate when you look at the “From” line even though it’s actually a fake. Email phishing is costing regular people and companies millions of dollars each year, if not more, and in response, Google and other companies have been talking about how we can move beyond the solutions we’ve developed individually over the years to make a real difference for the whole email industry.<br /><br />Industry groups come and go, and it’s not always easy to tell at the beginning which ones are actually going to generate good solutions. When the right contributors come together to solve real problems, though, real things happen. That’s why we’re particularly optimistic about <a href="http://www.dmarc.org/news/press_release_20120130.html">today’s announcement</a> of DMARC.org, a passionate collection of companies focused on significantly cutting down on email phishing and other malicious mail.<br /><br />Building upon the work of previous mail authentication standards like <a href="http://en.wikipedia.org/wiki/Sender_Policy_Framework">SPF</a> and <a href="http://www.dkim.org/">DKIM</a>, DMARC is responding to domain spoofing and other phishing methods by creating a standard protocol by which we’ll be able to measure and enforce the authenticity of emails. With DMARC, large email senders can ensure that the email they send is being recognized by mail providers like Gmail as legitimate, as well as set policies so that mail providers can reject messages that try to spoof the senders’ addresses.<br /><br />We’ve been active in the leadership of the DMARC group for almost two years, and now that Gmail and several other large mail senders and providers — namely Facebook, LinkedIn, and PayPal — are actively using the DMARC specification, the road is paved for more members of the email ecosystem to start getting a handle on phishing. Our recent data indicates that roughly 15% of non-spam messages in Gmail are already coming from domains protected by DMARC, which means Gmail users like you don’t need to worry about spoofed messages from these senders. The phishing potential plummets when the system just works, and that’s what DMARC provides.<br /><br />If you’re a large email sender and you want to try out the DMARC specification, you can learn more at the <a href="http://www.dmarc.org/">DMARC website</a>. Even if you’re not ready to take on the challenge of authenticating all your outbound mail just yet, there’s no reason to not sign up to start receiving reports of mail that fraudulently claims to originate from your address. With further adoption of DMARC, we can all look forward to a more trustworthy overall experience with email.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/landing-another-blow-against-email-phishing-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Tech tips that are Good to Know</title>
		<link>https://googledata.org/google-online-security/tech-tips-that-are-good-to-know-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tech-tips-that-are-good-to-know-2</link>
		<comments>https://googledata.org/google-online-security/tech-tips-that-are-good-to-know-2/#comments</comments>
		<pubDate>Tue, 17 Jan 2012 06:37:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=0c0ef828713b39d58574ab9cd5db8811</guid>
		<description><![CDATA[<span>Posted by Alma Whitten, Director of Privacy, Product and Engineering</span><br /><br /><i>(Cross-posted from the <a href="http://googleblog.blogspot.com/2012/01/tech-tips-that-are-good-to-know.html">Official Google Blog</a>)</i><br /><br />Does this person sound familiar? He can&#8217;t be bothered to type a password into his phone every time he wants to play a game of Angry Birds. When he does need a password, maybe for his email or bank website, he chooses one that&#8217;s easy to remember like his sister&#8217;s name&#8212;and he uses the same one for each website he visits. For him, cookies come from the bakery, IP addresses are the locations of Intellectual Property and a correct Google search result is basically magic.<br /><br />Most of us know someone like this. Technology can be confusing, and the industry often fails to explain clearly enough why digital literacy matters. So today in the U.S. we&#8217;re kicking off <a href="http://google.com/goodtoknow">Good to Know</a>, our biggest-ever consumer education campaign focused on making the web a safer, more comfortable place. Our ad campaign, which we introduced in the U.K. and Germany last fall, offers privacy and security tips: Use <a href="http://www.google.com/goodtoknow/online-safety/security-tools/">2-step verification</a>! Remember to lock your computer when you step away! Make sure your connection to a website is <a href="http://www.google.com/goodtoknow/online-safety/secure-sites/">secure</a>! It also <a href="http://www.google.com/goodtoknow/data-on-the-web/">explains</a> some of the building blocks of the web like cookies and IP addresses. Keep an eye out for the ads in newspapers and magazines, online and in New York and Washington, D.C. subway stations.<br /><br /><br /><br />The campaign and <a href="http://www.google.com/goodtoknow">Good to Know website</a> build on our commitment to keeping people safe online. We&#8217;ve created resources like <a href="http://youtube.com/googleprivacy">privacy videos</a>, the <a href="http://www.google.com/security/">Google Security Center</a>, the <a href="http://www.google.com/familysafety/">Family Safety Center</a> and <a href="http://www.teachparentstech.org/">Teach Parents Tech</a> to help you develop strong privacy and security habits. We design for privacy, building tools like <a href="http://google.com/dashboard">Google Dashboard</a>, <a href="http://googlepublicpolicy.blogspot.com/2011/06/me-myself-and-i-helping-to-manage-your.html">Me on the Web</a>, the <a href="http://www.google.com/ads/preferences">Ads Preferences Manager</a> and <a href="http://www.youtube.com/watch?v=BeMZP-oyOII">Google+ Circles</a>&#8212;with more on the way.<br /><br />We encourage you to take a few minutes to check out the <a href="http://www.google.com/goodtoknow">Good to Know site</a>, watch <a href="http://www.youtube.com/watch?v=qjxDrmAaZIs&#38;feature=endscreen&#38;NR=1">some</a> <a href="http://www.youtube.com/watch?v=tz0FEnve_rs&#38;feature=relmfu">of</a> <a href="http://www.youtube.com/watch?v=U4FLL0TL6_4&#38;feature=relmfu">the</a> <a href="http://www.youtube.com/watch?v=A5wR9eEbHoY&#38;feature=relmfu">videos</a>, and be on the lookout for ads in your favorite newspaper or website. We hope you&#8217;ll learn something new about how to protect yourself online&#8212;tips that are always good to know!<div><br /></div><div><i><b>Update</b> 1/17</i>: Updated to include more background on Good to Know.</div>]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Alma Whitten, Director of Privacy, Product and Engineering</span><br /><br /><i>(Cross-posted from the <a href="http://googleblog.blogspot.com/2012/01/tech-tips-that-are-good-to-know.html">Official Google Blog</a>)</i><br /><br />Does this person sound familiar? He can’t be bothered to type a password into his phone every time he wants to play a game of Angry Birds. When he does need a password, maybe for his email or bank website, he chooses one that’s easy to remember like his sister’s name—and he uses the same one for each website he visits. For him, cookies come from the bakery, IP addresses are the locations of Intellectual Property and a correct Google search result is basically magic.<br /><br />Most of us know someone like this. Technology can be confusing, and the industry often fails to explain clearly enough why digital literacy matters. So today in the U.S. we’re kicking off <a href="http://google.com/goodtoknow">Good to Know</a>, our biggest-ever consumer education campaign focused on making the web a safer, more comfortable place. Our ad campaign, which we introduced in the U.K. and Germany last fall, offers privacy and security tips: Use <a href="http://www.google.com/goodtoknow/online-safety/security-tools/">2-step verification</a>! Remember to lock your computer when you step away! Make sure your connection to a website is <a href="http://www.google.com/goodtoknow/online-safety/secure-sites/">secure</a>! It also <a href="http://www.google.com/goodtoknow/data-on-the-web/">explains</a> some of the building blocks of the web like cookies and IP addresses. Keep an eye out for the ads in newspapers and magazines, online and in New York and Washington, D.C. subway stations.<br /><br /><embed flashvars="host=picasaweb.google.com&amp;hl=en_US&amp;feat=flashalbum&amp;RGB=0x000000&amp;feed=https%3A%2F%2Fpicasaweb.google.com%2Fdata%2Ffeed%2Fapi%2Fuser%2F116887554964117158278%2Falbumid%2F5698403762820753729%3Falt%3Drss%26kind%3Dphoto%26authkey%3DGv1sRgCKWdqPvJqo2aHg%26hl%3Den_US" height="334" pluginspage="http://www.macromedia.com/go/getflashplayer" src="https://picasaweb.google.com/s/c/bin/slideshow.swf" type="application/x-shockwave-flash" width="500"></embed><br /><br />The campaign and <a href="http://www.google.com/goodtoknow">Good to Know website</a> build on our commitment to keeping people safe online. We’ve created resources like <a href="http://youtube.com/googleprivacy">privacy videos</a>, the <a href="http://www.google.com/security/">Google Security Center</a>, the <a href="http://www.google.com/familysafety/">Family Safety Center</a> and <a href="http://www.teachparentstech.org/">Teach Parents Tech</a> to help you develop strong privacy and security habits. We design for privacy, building tools like <a href="http://google.com/dashboard">Google Dashboard</a>, <a href="http://googlepublicpolicy.blogspot.com/2011/06/me-myself-and-i-helping-to-manage-your.html">Me on the Web</a>, the <a href="http://www.google.com/ads/preferences">Ads Preferences Manager</a> and <a href="http://www.youtube.com/watch?v=BeMZP-oyOII">Google+ Circles</a>—with more on the way.<br /><br />We encourage you to take a few minutes to check out the <a href="http://www.google.com/goodtoknow">Good to Know site</a>, watch <a href="http://www.youtube.com/watch?v=qjxDrmAaZIs&amp;feature=endscreen&amp;NR=1">some</a> <a href="http://www.youtube.com/watch?v=tz0FEnve_rs&amp;feature=relmfu">of</a> <a href="http://www.youtube.com/watch?v=U4FLL0TL6_4&amp;feature=relmfu">the</a> <a href="http://www.youtube.com/watch?v=A5wR9eEbHoY&amp;feature=relmfu">videos</a>, and be on the lookout for ads in your favorite newspaper or website. We hope you’ll learn something new about how to protect yourself online—tips that are always good to know!<div><br /></div><div><i><b>Update</b> 1/17</i>: Updated to include more background on Good to Know.</div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/tech-tips-that-are-good-to-know-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Expanding Safe Browsing Alerts to include malware distribution domains</title>
		<link>https://googledata.org/google-online-security/expanding-safe-browsing-alerts-to-include-malware-distribution-domains/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=expanding-safe-browsing-alerts-to-include-malware-distribution-domains</link>
		<comments>https://googledata.org/google-online-security/expanding-safe-browsing-alerts-to-include-malware-distribution-domains/#comments</comments>
		<pubDate>Thu, 01 Dec 2011 19:05:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=cfccabb18df05547f9aa320fbabc0380</guid>
		<description><![CDATA[<span>Posted by Nav Jagpal, Security Team</span><br /><br />For the past year, we&#8217;ve been sending notifications to network administrators registered through the <a href="http://googleonlinesecurity.blogspot.com/2010/09/safe-browsing-alerts-for-network.html">Safe Browsing Alerts for Network Administrators</a> service when our automated tools find phishing URLs or compromised sites that lead to malware on their networks. These notifications provide administrators with important information to help them improve the security of their networks.<br /><br />Today we&#8217;re adding distribution domains to the set of information we share. These are domains that are responsible for launching exploits and serving malware. Unlike compromised sites, which are often run by innocent webmasters, distribution domains are set up with the primary purpose of serving malicious content.<br /><br />If you&#8217;re a network administrator and haven&#8217;t yet registered your AS, you can do so <a href="http://www.google.com/safebrowsing/alerts/">here</a>.]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Nav Jagpal, Security Team</span><br /><br />For the past year, we’ve been sending notifications to network administrators registered through the <a href="http://googleonlinesecurity.blogspot.com/2010/09/safe-browsing-alerts-for-network.html">Safe Browsing Alerts for Network Administrators</a> service when our automated tools find phishing URLs or compromised sites that lead to malware on their networks. These notifications provide administrators with important information to help them improve the security of their networks.<br /><br />Today we’re adding distribution domains to the set of information we share. These are domains that are responsible for launching exploits and serving malware. Unlike compromised sites, which are often run by innocent webmasters, distribution domains are set up with the primary purpose of serving malicious content.<br /><br />If you’re a network administrator and haven’t yet registered your AS, you can do so <a href="http://www.google.com/safebrowsing/alerts/">here</a>.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/expanding-safe-browsing-alerts-to-include-malware-distribution-domains/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Reminder: Safe Browsing version 1 API turning down December 1</title>
		<link>https://googledata.org/google-online-security/reminder-safe-browsing-version-1-api-turning-down-december-1/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reminder-safe-browsing-version-1-api-turning-down-december-1</link>
		<comments>https://googledata.org/google-online-security/reminder-safe-browsing-version-1-api-turning-down-december-1/#comments</comments>
		<pubDate>Tue, 22 Nov 2011 20:46:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=a16adb79b11bad2b8a47b2c7ce45df0b</guid>
		<description><![CDATA[Posted by Brian Ryner, Security TeamIn May we announced that we are ending support for the Safe Browsing protocol version 1 on December 1 in order to focus our resources on the new version 2 API and the lookup service. These new APIs provide simpler an...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Brian Ryner, Security Team</span><br /><br />In May we <a href="http://googleonlinesecurity.blogspot.com/2011/05/safe-browsing-protocol-v2-transition.html">announced</a> that we are ending support for the Safe Browsing protocol version 1 on December 1 in order to focus our resources on the <a href="http://code.google.com/apis/safebrowsing/developers_guide_v2.html">new version 2 API</a> and the <a href="http://code.google.com/apis/safebrowsing/lookup_guide.html">lookup service</a>. These new APIs provide simpler and more efficient access to the same data, and they use significantly less bandwidth. If you haven't yet migrated off of the version 1 API, we encourage you to do so as soon as possible. Our <a href="http://googleonlinesecurity.blogspot.com/2011/05/safe-browsing-protocol-v2-transition.html">earlier post</a> contains links to documentation for the new protocol version and other resources to help you make the transition smoothly.<br /><br />After December 1, we will remove all data from the version 1 API list to ensure that any remaining clients do not have false positives in their database. After January 1, 2012, we will turn off the version 1 service completely, and all requests will return a 404 error.<br /><br />Thanks for your cooperation, and enjoy using the next generation of Safe Browsing.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/reminder-safe-browsing-version-1-api-turning-down-december-1/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Protecting data for the long term with forward secrecy</title>
		<link>https://googledata.org/google-online-security/protecting-data-for-the-long-term-with-forward-secrecy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-data-for-the-long-term-with-forward-secrecy</link>
		<comments>https://googledata.org/google-online-security/protecting-data-for-the-long-term-with-forward-secrecy/#comments</comments>
		<pubDate>Tue, 22 Nov 2011 18:35:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=b469379a415b08b2d33c3728769a4277</guid>
		<description><![CDATA[Posted by Adam Langley, Security TeamLast year we introduced HTTPS by default for Gmail and encrypted search. We’re pleased to see that other major communications sites are following suit and deploying HTTPS in one form or another. We are now pushing...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Adam Langley, Security Team</span><br /><br />Last year we introduced <a href="http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html">HTTPS by default for Gmail</a> and <a href="http://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html">encrypted search</a>. We’re pleased to see that other major communications sites are following suit and deploying HTTPS in one form or another. We are now pushing forward by enabling <a href="http://en.wikipedia.org/wiki/Perfect_forward_secrecy">forward secrecy</a> by default.<br /><br />Most major sites supporting HTTPS operate in a non-forward secret fashion, which runs the risk of retrospective decryption. In other words, an encrypted, unreadable email could be recorded while being delivered to your computer today. In ten years time, when computers are much faster, an adversary could break the server private key and retrospectively decrypt today’s email traffic.<br /><br />Forward secrecy requires that the private keys for a connection are not kept in persistent storage. An adversary that breaks a single key will no longer be able to decrypt months’ worth of connections; in fact, not even the server operator will be able to retroactively decrypt HTTPS sessions.<br /><br />Forward secret HTTPS is now live for Gmail and many other Google HTTPS services(*), like SSL Search, Docs and Google+. We have also <a href="http://cvs.openssl.org/fileview?f=openssl/CHANGES&amp;v=1.1481.2.56.2.57">released the work</a> that we did on the open source OpenSSL library that made this possible. You can check whether you have forward secret connections in Chrome by clicking on the green padlock in the address bar of HTTPS sites. Google’s forward secret connections will have a key exchange mechanism of ECDHE_RSA.<br /><br />We would very much like to see forward secrecy become the norm and hope that our deployment serves as a demonstration of the practicality of that vision.<br /><br /><img src="http://2.bp.blogspot.com/-20_ugsK-IWE/TsvjjV1HeEI/AAAAAAAABB0/po9E_RCeEns/s400/ecdhe.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5677881951525500994" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 270px; " /><br />(* Chrome, Firefox (all platforms) and Internet Explorer (Vista or later) support forward secrecy using elliptic curve Diffie-Hellman. Initially, only Chrome and Firefox will use it by default with Google services because IE doesn’t support the combination of ECDHE and RC4. We hope to support IE in the future.)]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/protecting-data-for-the-long-term-with-forward-secrecy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Gmail account security in Iran</title>
		<link>https://googledata.org/google-online-security/gmail-account-security-in-iran/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gmail-account-security-in-iran</link>
		<comments>https://googledata.org/google-online-security/gmail-account-security-in-iran/#comments</comments>
		<pubDate>Fri, 09 Sep 2011 00:49:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=4aa8207e1c9d7390b722fc76c615ee2b</guid>
		<description><![CDATA[Posted by Eric Grosse, VP Security EngineeringWe learned last week that the compromise of a Dutch company involved with verifying the authenticity of websites could have put the Internet communications of many Iranians at risk, including their Gmail. W...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Eric Grosse, VP Security Engineering</span><br /><br />We <a href="http://googleonlinesecurity.blogspot.com/2011/08/update-on-attempted-man-in-middle.html">learned last week</a> that the compromise of a Dutch company involved with verifying the authenticity of websites could have put the Internet communications of many Iranians at risk, including their Gmail. While Google’s internal systems were not compromised, we are directly contacting possibly affected users and providing similar information below because our top priority is to protect the privacy and security of our users.<br /><br />While users of the Chrome browser were protected from this threat, we advise all users in Iran to take concrete steps to secure their accounts:<br /><div><ol><li>Change your password. You may have already been asked to change your password when you signed in to your Google Account. If not, you can change it <a href="https://mail.google.com/support/bin/answer.py?answer=6567">here</a>.</li><li>Verify your account recovery options. Secondary email addresses, phone numbers, and other information can help you regain access to your account if you lose your password. Check to be sure your recovery options are correct and up to date <a href="http://www.google.com/support/accounts/bin/answer.py?answer=183723">here</a>. </li><li>Check the websites and applications that are allowed to access your account, and revoke any that are unfamiliar <a href="http://www.google.com/support/accounts/bin/answer.py?answer=41236">here</a>. </li><li>Check your Gmail settings for suspicious <a href="https://mail.google.com/support/bin/answer.py?answer=10957">forwarding addresses</a> or <a href="https://mail.google.com/support/bin/answer.py?hl=en&amp;ctx=mail&amp;answer=138350">delegated accounts</a>. </li><li>Pay careful attention to <a href="http://www.google.com/support/chrome/bin/answer.py?answer=95617">warnings that appear</a> in your web browser and don’t click past them.</li></ol>For more ways to secure your account, you can visit <a href="http://www.google.com/help/security">http://www.google.com/help/security</a>. If you believe your account has been compromised, you can start the recovery process <a href="https://mail.google.com/support/bin/answer.py?answer=50270">here</a>.</div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/gmail-account-security-in-iran/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Four Years of Web Malware</title>
		<link>https://googledata.org/google-online-security/four-years-of-web-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=four-years-of-web-malware</link>
		<comments>https://googledata.org/google-online-security/four-years-of-web-malware/#comments</comments>
		<pubDate>Wed, 17 Aug 2011 22:41:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=81db0c866ebc6a72471229b420431a05</guid>
		<description><![CDATA[Posted by Lucas Ballard and Niels Provos, Google Security Team Google’s Safe Browsing initiative has been protecting users from web pages that install malware for over five years now. Each day we show around 3 million malware warnings to over four hu...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Lucas Ballard and Niels Provos, Google Security Team</span> <br /><br />Google’s Safe Browsing initiative has been protecting users from web pages that install malware for over five years now. Each day we show around 3 million malware warnings to over four hundred million users whose browsers implement the Safe Browsing API. Like other service providers, we are engaged in an arms race with malware distributors. Over time, we have adapted our original system to incorporate new detection algorithms that allow us to keep pace. We recently completed an analysis of four years of data that explores the evasive techniques that malware distributors employ. We compiled the results in a technical report, entitled “<a href="http://research.google.com/archive/papers/rajab-2011a.pdf">Trends in Circumventing Web-Malware Detection</a>.” <br /><br />Below are a few of the research highlights, but we recommend reviewing the <a href="http://research.google.com/archive/papers/rajab-2011a.pdf">full report</a> for details on our methodology and measurements. The analysis covers approximately 160 million web pages hosted on approximately 8 million sites. <br /><br /><b>Social Engineering</b> <br />Social engineering is a malware distribution mechanism that relies on tricking a user into installing malware. Typically, the malware is disguised as an anti-virus product or browser plugin. Social engineering has increased in frequency significantly and is still rising. However, it’s important to keep this growth in perspective — sites that rely on social engineering comprise only 2% of all sites that distribute malware. <br /><br /><img alt="" border="0" id="BLOGGER_PHOTO_ID_5641924082717200370" src="http://2.bp.blogspot.com/-pd4wqihsTIQ/TkwkD6AUj_I/AAAAAAAAAuY/TeJEAciv9Sg/social-distribution.png" style="cursor: pointer; display: block; margin-bottom: 10px; margin-left: auto; margin-right: auto; margin-top: 0px; text-align: center; width: 450px;" /> <br /><div style="text-align: center;"><i><span style="font-size: x-small;">Number of sites distributing Social Engineering Malware and Exploits over time</span></i></div><br /><b>Drive-by Download Exploit Trends</b> <br />Far more common than social engineering, malicious pages install malware after exploiting a vulnerability in the browser or a plugin. This type of infection is often called a drive-by download. Our analysis of which vulnerabilities are actively being exploited over time shows that adversaries quickly switch to new and more reliable exploits to help avoid detection. The graph below shows the ratio of exploits targeting a vulnerability in one CVE to all exploits over time.  Most vulnerabilities are exploited only for a short period of time until new vulnerabilities become available. A prominent exception is the MDAC vulnerability which is present in most exploit kits. <br /><br /><a href="http://1.bp.blogspot.com/-a4FwsvAv2uo/TkwlJmsQ0ZI/AAAAAAAAAug/sDVrNJ8DIaw/s1600/cveheatmap.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5641925280123638162" src="http://1.bp.blogspot.com/-a4FwsvAv2uo/TkwlJmsQ0ZI/AAAAAAAAAug/sDVrNJ8DIaw/cveheatmap.png" style="cursor: hand; cursor: pointer; display: block; margin: 0px auto 10px; text-align: center; width: 450px;" /></a><br /><div style="text-align: center;"><span style="font-size: x-small;"><i>Prevalence of exploits targeting specific CVEs over time</i></span> </div><br /><div style="text-align: left;"><b>Increase in IP Cloaking</b> <br />Malware distributors are increasingly relying upon ‘cloaking’ as a technique to evade detection.  The concept behind cloaking is simple: serve benign content to detection systems, but serve malicious content to normal web page visitors. Over the years, we have seen more malicious sites engaging in IP cloaking. To bypass the cloaking defense, we run our scanners in different ways to mimic regular user traffic. <br /><br /><a href="http://2.bp.blogspot.com/-BYgPmr6BlPg/Tkwlhr_F9fI/AAAAAAAAAuo/ayh90GC9cgQ/s1600/cloaking_impact.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5641925693861656050" src="http://2.bp.blogspot.com/-BYgPmr6BlPg/Tkwlhr_F9fI/AAAAAAAAAuo/ayh90GC9cgQ/cloaking_impact.png" style="cursor: hand; cursor: pointer; display: block; margin: 0px auto 10px; text-align: center; width: 450px;" /></a><br /><div style="text-align: center;"><span style="font-size: x-small;"><i>Number of sites practicing IP Cloaking over time</i></span></div><br /><b>New Detection Capabilities</b> <br />Our report analyzed four years of data to uncover trends in malware distribution on the web, and it demonstrates the ongoing tension between malware distributors and malware detectors. To help protect Internet users, even those who don’t use Google, we have updated the Safe Browsing infrastructure over the years to incorporate many state-of-the-art malware detection technologies. We hope the findings outlined in this report will help other researchers in this area and raise awareness of some of the current challenges. </div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/four-years-of-web-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Fuzzing at scale</title>
		<link>https://googledata.org/google-online-security/fuzzing-at-scale/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fuzzing-at-scale</link>
		<comments>https://googledata.org/google-online-security/fuzzing-at-scale/#comments</comments>
		<pubDate>Fri, 12 Aug 2011 21:59:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=3fda8ad724abd8346942b5df0d357d80</guid>
		<description><![CDATA[Posted by Chris Evans, Matt Moore and Tavis Ormandy, Google Security Team

One of the exciting things about working on security at Google is that you have a lot of compute horsepower available if you need it. This is very useful if you’re looking to ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Chris Evans, Matt Moore and Tavis Ormandy, Google Security Team</span>
<br />
<br />One of the exciting things about working on security at Google is that you have a lot of compute horsepower available if you need it. This is very useful if you’re looking to <a href="http://en.wikipedia.org/wiki/Fuzz_testing">fuzz</a> something, and especially if you’re going to use modern fuzzing techniques.
<br />
<br />Using these techniques and large amounts of compute power, we’ve found hundreds of bugs in our own code, including Chrome components such as WebKit and the PDF viewer. We recently decided to apply the same techniques to fuzz Adobe’s Flash Player, which we include with Chrome in partnership with Adobe.
<br />
<br />A good overview of some modern techniques can be read <a href="http://taviso.decsystem.org/making_software_dumber.pdf">in this presentation</a>. For the purposes of fuzzing Flash, we mainly relied on “corpus distillation”. This is a technique whereby you locate a large number of sample files for the format at hand (SWF in this case). You then see which areas of code are reached by each of the sample files. Finally, you run an algorithm to generate a minimal set of sample files that achieves the code coverage of the full set. This calculated set of files is a great basis for fuzzing: a manageable number of files that exercise lots of unusual code paths.
<br />
<br />What does corpus distillation look like at Google scale? Turns out we have a large index of the web, so we cranked through 20 terabytes of SWF file downloads followed by 1 week of run time on 2,000 CPU cores to calculate the minimal set of about 20,000 files. Finally, those same 2,000 cores plus 3 more weeks of runtime were put to good work mutating the files in the minimal set (bitflipping, etc.) and generating crash cases. These crash cases included an interesting range of vulnerability categories, including buffer overflows, integer overflows, use-after-frees and object type confusions.
<br />
<br />The initial run of the ongoing effort resulted in about 400 unique crash signatures, which were logged as 106 individual security bugs following Adobe's initial triage. As these bugs were resolved, many were identified as duplicates that weren't caught during the initial triage. A unique crash signature does not always indicate a unique bug. Since Adobe has access to symbols and sources, they were able to group similar crashes to perform root cause analysis reducing the actual number of changes to the code. No analysis was performed to determine how many of the identified crashes were actually exploitable. However, each crash was treated as though it were potentially exploitable and addressed by Adobe. In the final analysis, the Flash Player update Adobe shipped earlier this week contained about 80 code changes to fix these bugs.
<br />
<br />Commandeering massive resource to improve security is rewarding on its own, but the real highlight of this exercise has been Adobe’s response. The <a href="http://www.adobe.com/support/security/bulletins/apsb11-21.html">Flash patch</a> earlier this week fixes these bugs and incorporates UIPI protections for the Flash Player sandbox in Chrome which Justin Schuh contributed assistance on developing. Fixing <a href="http://blogs.adobe.com/asset/2011/08/how-did-you-get-to-that-number.html">so many issues</a> in such a short time frame shows a real commitment to security from Adobe, for which we are grateful.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-3679451503660073250?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/fuzzing-at-scale/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>2-step verification: stay safe around the world in 40 languages</title>
		<link>https://googledata.org/google-online-security/2-step-verification-stay-safe-around-the-world-in-40-languages/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=2-step-verification-stay-safe-around-the-world-in-40-languages</link>
		<comments>https://googledata.org/google-online-security/2-step-verification-stay-safe-around-the-world-in-40-languages/#comments</comments>
		<pubDate>Thu, 28 Jul 2011 16:08:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=772e745fc5351413303f4d7ef8592b10</guid>
		<description><![CDATA[Posted by Nishit Shah, Product Manager, Google Security(Cross-posted from the Official Google Blog)Earlier this year, we introduced a security feature called 2-step verification that helps protect your Google Account from threats like password compromi...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Nishit Shah, Product Manager, Google Security</span><br /><br /><i>(Cross-posted from the <a href="http://googleblog.blogspot.com/2011/07/2-step-verification-stay-safe-around.html">Official Google Blog</a>)</i><br /><br />Earlier this year, we <a href="http://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html">introduced</a> a security feature called <i>2-step verification</i> that helps protect your Google Account from threats like password compromise and identity theft. By entering a one-time verification code from your phone after you type your password, you can make it much tougher for an unauthorized person to gain access to your account.<br /><br />People have told us how much they like the feature, which is why we're thrilled to offer 2-step verification in 40 languages and in more than 150 countries. There’s never been a better time to set it up: Examples in the news of password theft and data breaches constantly remind us to stay on our toes and take advantage of tools to properly secure our valuable online information. Email, social networking and other online accounts still get compromised today, but 2-step verification cuts those risks significantly.<br /><br />We recommend investing some time in keeping your information safe by watching our <a href="http://www.google.com/support/accounts/bin/static.py?page=guide.cs&amp;guide=1056283&amp;topic=1056284">2-step verification video</a> to learn how to quickly increase your Google Account’s resistance to common problems like reused passwords and <a href="http://www.google.com/support/chrome/bin/answer.py?answer=99020">malware and phishing scams</a>. Wherever you are in the world, <a href="http://www.google.com/support/accounts/bin/static.py?page=guide.cs&amp;guide=1056283&amp;topic=1056284">sign up for 2-step verification</a> and help keep yourself one step ahead of the bad guys.<br /><br />To learn more about online safety tips and resources, visit our ongoing security <a href="http://googleblog.blogspot.com/search/label/security">blog series</a>, and review a couple of simple <a href="http://www.google.com/help/security/">tips and tricks</a> for online security. Also, watch our video about <a href="http://www.youtube.com/watch?hl=en&amp;v=nOgsXdB67Pc">five easy ways</a> to help you stay safe and secure as you browse.<br /><br /><i><b>Update</b> on 12/1/11</i>: We recently made 2-step verification available for users in even more places, including Iran, Japan, Liberia, Myanmar (Burma), Sudan and Syria. This enhanced security feature for Google Accounts is now available in more than 175 countries.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-8706672392619937063?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/2-step-verification-stay-safe-around-the-world-in-40-languages/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Introducing DOM Snitch, our passive in-the-browser reconnaissance tool</title>
		<link>https://googledata.org/google-online-security/introducing-dom-snitch-our-passive-in-the-browser-reconnaissance-tool-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=introducing-dom-snitch-our-passive-in-the-browser-reconnaissance-tool-2</link>
		<comments>https://googledata.org/google-online-security/introducing-dom-snitch-our-passive-in-the-browser-reconnaissance-tool-2/#comments</comments>
		<pubDate>Tue, 21 Jun 2011 18:46:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=6a63f2c3de61329308744a8656e9cbd0</guid>
		<description><![CDATA[Posted by Radoslav Vasilev, Security Test Engineer(Cross-posted from the Google Testing Blog)Every day modern web applications are becoming increasingly sophisticated, and as their complexity grows so does their attack surface. Previously we introduced...]]></description>
				<content:encoded><![CDATA[<div style="text-align: left;">Posted by Radoslav Vasilev, Security Test Engineer</div><div><br /></div><div><i>(Cross-posted from the <a href="http://googletesting.blogspot.com/2011/06/introducing-dom-snitch-our-passive-in.html">Google Testing Blog</a>)</i></div><br />Every day modern web applications are becoming increasingly sophisticated, and as their complexity grows so does their attack surface. Previously we introduced open source tools such as <a href="https://code.google.com/p/skipfish/">Skipfish</a> and <a href="https://code.google.com/p/ratproxy/">Ratproxy</a> to assist developers in understanding and securing these applications.<br /><br />As existing tools focus mostly on testingserver-side code, today we are happy to introduce <a href="https://code.google.com/p/domsnitch/">DOM Snitch</a> — an experimental* Chrome extension that enables developers and testers to identify insecure practices commonly found in client-side code. To do this, we have adopted <a href="http://code.google.com/p/domsnitch/wiki/DOMSnitchDoc#How_does_DOM_Snitch_work_under_the_hood?">several approaches</a> to intercepting JavaScript calls to key and potentially dangerous browser infrastructure such as document.write or HTMLElement.innerHTML (<a href="http://code.google.com/p/domsnitch/wiki/DOMSnitchDoc#What_can_DOM_Snitch_intercept?">among others</a>). Once a JavaScript call has been intercepted, DOM Snitch records the document URL and a complete stack trace that will help assess if the intercepted call can lead to cross-site scripting, mixed content, insecure modifications to the <a href="https://code.google.com/p/browsersec/wiki/Part2#Same-origin_policy_for_DOM_access">same-origin policy for DOM access</a>, or other client-side issues.<br /><div><br /><img src="http://4.bp.blogspot.com/-3xmWRSsMB2g/TgDmE-F6ptI/AAAAAAAAAk4/ty1nL1ZY570/s400/domsnitch.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 211px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5620745308020057810" /><br /></div><div>Here are the benefits of DOM Snitch:<br /><ul><li><b>Real-time:</b> Developers can observe DOM modifications as they happen inside the browser without the need to step through JavaScript code with a debugger or pause the execution of their application.</li><li><b>Easy to use:</b> With built-in <a href="https://code.google.com/p/domsnitch/wiki/QuickIntro#Current_capabilities">security heuristics</a> and nested views, both advanced and less experienced developers and testers can quickly spot areas of the application being tested that need more attention.</li><li><b>Easier collaboration:</b> Enables developers to easily export and share captured DOM modifications while troubleshooting an issue with their peers.</li></ul>DOM Snitch is intended for use by developers, testers, and security researchers alike. <a href="https://code.google.com/p/domsnitch/downloads/list">Click here</a> to download DOM Snitch. To read the documentation, please visit <a href="https://code.google.com/p/domsnitch/wiki/DOMSnitchDoc">this page</a>.<br /><br /><br />*Developers and testers should be aware that DOM Snitch is currently experimental. We do not guarantee that it will work flawlessly for all web applications. More details on known issues can be found <a href="https://code.google.com/p/domsnitch/wiki/KnownIssues">here</a> or in the project’s <a href="https://code.google.com/p/domsnitch/issues/list">issues tracker</a>.</div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-3707854928375167843?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/introducing-dom-snitch-our-passive-in-the-browser-reconnaissance-tool-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Protecting users from malware hosted on bulk subdomain services</title>
		<link>https://googledata.org/uncategorized/protecting-users-from-malware-hosted-on-bulk-subdomain-services/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-users-from-malware-hosted-on-bulk-subdomain-services</link>
		<comments>https://googledata.org/uncategorized/protecting-users-from-malware-hosted-on-bulk-subdomain-services/#comments</comments>
		<pubDate>Fri, 17 Jun 2011 15:19:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=635ec6e7b0871d851f38ff69d1f75c3e</guid>
		<description><![CDATA[Posted by Oliver Fisher, Google Anti-Malware TeamOver the past few months, Google’s systems have detected a number of bulk subdomain providers becoming targets of abuse by malware distributors. Bulk subdomain providers register a domain name, like ex...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Oliver Fisher, Google Anti-Malware Team</span><br /><br />Over the past few months, Google’s systems have detected a number of bulk subdomain providers becoming targets of abuse by malware distributors. Bulk subdomain providers register a domain name, like example.com, and then sell subdomains of this domain name, like subdomain.example.com. Subdomains are often registered by the thousands at one time and are used to distribute malware and fake anti-virus products on the web. In some cases our malware scanners have found more than 50,000 malware domains from a single bulk provider.<br /><br />Google’s automated malware scanning systems detect sites that distribute malware. To help protect users we recently modified those systems to identify bulk subdomain services which are being abused. In some severe cases our systems may now flag the whole bulk domain.<br /><br />We offer many services to webmasters to help them fight abuse, such as:<br /><ul><li><a href="http://www.google.com/webmasters/tools/">Webmaster Tools</a> lets webmasters find examples of URLs under their domains that may be distributing malware.</li><li><a href="http://googleonlinesecurity.blogspot.com/2010/09/safe-browsing-alerts-for-network.html">Google Safe Browsing Alerts for Network Administrators</a> allows owners of Autonomous Systems to get notifications for hosts that are involved in malware delivery. </li></ul>If you are the owner of a website that is hosted in a bulk subdomain service, please consider contacting your bulk subdomain provider if Google SafeBrowsing shows a warning for your site. The top-level bulk subdomain may be a target of abuse. Bulk subdomain service providers may use Google’s tools to help identify and disable abusive subdomains and accounts.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-1314099224771804657?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/protecting-users-from-malware-hosted-on-bulk-subdomain-services/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Website Security for Webmasters</title>
		<link>https://googledata.org/google-online-security/website-security-for-webmasters/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=website-security-for-webmasters</link>
		<comments>https://googledata.org/google-online-security/website-security-for-webmasters/#comments</comments>
		<pubDate>Thu, 05 May 2011 19:33:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=299989719432f89dca9d51b47aabfd99</guid>
		<description><![CDATA[Posted by Gary Illyes, Webmaster Trends Analyst(Cross-posted from the Webmaster Central Blog)Users are taught to protect themselves from malicious programs by installing sophisticated antivirus software, but they often also entrust their private inform...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Gary Illyes, Webmaster Trends Analyst</span><br /><br /><div><i>(Cross-posted from the <a href="http://googlewebmastercentral.blogspot.com/2011/05/website-security-for-webmasters.html">Webmaster Central Blog</a>)</i></div><div><br />Users are taught to protect themselves from malicious programs by installing sophisticated antivirus software, but they often also entrust their private information to various websites. As a result, webmasters have a dual task to protect both their website itself and the user data that they receive.<br /><br />Over the years companies and webmasters have learned—often the hard way—that web application security is not a joke; we’ve seen user passwords leaked due to <a href="http://en.wikipedia.org/wiki/SQL_injection">SQL injection</a> attacks, cookies stolen with <a href="http://en.wikipedia.org/wiki/Cross-site_scripting">XSS</a>, and websites taken over by hackers due to negligent input validation.<br /><br /><img alt="" border="0" id="BLOGGER_PHOTO_ID_5603170363751903522" src="http://4.bp.blogspot.com/-edYHtaKmejg/TcJ1wkttsSI/AAAAAAAAABI/pcTuQ092SRU/s320/image05.png" style="cursor: hand; cursor: pointer; float: left; height: 40px; margin: 0 10px 10px 0; width: 40px;" />Today we’ll show you some examples of how a web application can be exploited so you can learn from them; for this we’ll use <a href="http://google-gruyere.appspot.com/">Gruyere</a>, an intentionally vulnerable application we use for security training internally, and that we introduced here <a href="http://googleonlinesecurity.blogspot.com/2010/05/do-know-evil-web-application.html">last year</a>. <span style="font-weight: bold;">Do not probe others’ websites for vulnerabilities without permission</span> as it may be perceived as hacking; but you’re welcome—nay, encouraged—to run tests on Gruyere.<br /><br /><div><br /><span style="font-weight: bold;">Client state manipulation - What will happen if I alter the URL?</span><br /><br />Let’s say you have an image hosting site and you’re using a PHP script to display the images users have uploaded:<br /><br /><span style="font-style: italic;">http://www.example.com/showimage.php?imgloc=/garyillyes/kitten.jpg</span><br /><br />So what will the application do if I alter the URL to something like this and userpasswords.txt is an actual file?<br /><br /><span style="font-style: italic;">http://www.example.com/showimage.php?imgloc=/../../userpasswords.txt</span><br /><br />Will I get the content of userpasswords.txt?<br /><br />Another example of client state manipulation is when form fields are not validated. For instance, let’s say you have this form:<br /><br /><a href="http://4.bp.blogspot.com/-CUl2wmaPSfU/TcJ26natwlI/AAAAAAAAABY/FJLhqkOijIE/s1600/image01.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5603171635787842130" src="http://4.bp.blogspot.com/-CUl2wmaPSfU/TcJ26natwlI/AAAAAAAAABY/FJLhqkOijIE/s400/image01.png" style="cursor: hand; cursor: pointer; display: block; height: 224px; margin: 0px auto 10px; text-align: center; width: 400px;" /></a><br /><br />It seems that the username of the submitter is stored in a hidden input field. Well, that’s great! Does that mean that if I change the value of that field to another username, I can submit the form as that user? It may very well happen; the user input is apparently not authenticated with, for example, a token which can be verified on the server.<br />Imagine the situation if that form were part of your shopping cart and I modified the price of a $1000 item to $1, and then placed the order.<br /><br />Protecting your application against this kind of attack is not easy; take a look at the third part of <a href="http://google-gruyere.appspot.com/part3">Gruyere</a> to learn a few tips about how to defend your app.<br /><br /><span style="font-weight: bold;">Cross-site scripting (XSS) - User input can’t be trusted</span><br /><br /><a href="http://1.bp.blogspot.com/-zl9GLNOZTSU/TcJ3RWU3pHI/AAAAAAAAABg/QWpA-wnwCkE/s1600/image04.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5603172026336912498" src="http://1.bp.blogspot.com/-zl9GLNOZTSU/TcJ3RWU3pHI/AAAAAAAAABg/QWpA-wnwCkE/s400/image04.png" style="cursor: hand; cursor: pointer; display: block; height: 250px; margin: 0px auto 10px; text-align: center; width: 350px;" /></a><br /><br />A simple, harmless URL:<br /><span style="font-style: italic;">http://google-gruyere.appspot.com/611788451095/%3Cscript%3Ealert('0wn3d')%3C/script%3E</span><br />But is it truly harmless? If I decode the <a href="http://en.wikipedia.org/wiki/Percent_encoding">percent-encoded</a> characters, I get:<br /><pre style="text-align: center;">&lt;script&gt;alert('0wn3d')&lt;/script&gt;</pre><br />Gruyere, just like many sites with <a href="http://www.google.com/support/webmasters/bin/answer.py?answer=93641">custom error pages</a>, is designed to include the path component in the HTML page. This can introduce security bugs, like XSS, as it introduces user input directly into the rendered HTML page of the web application. You might say, “It’s just an alert box, so what?” The thing is, if I can inject an alert box, I can most likely inject something else, too, and maybe steal your cookies which I could use to sign in to your site as you.<br /><br />Another example is when the stored user input isn’t sanitized. Let’s say I write a comment on your blog; the comment is simple:<br /><pre style="text-align: center;">&lt;a href=”javascript:alert(‘0wn3d’)”&gt;Click here to see a kitten&lt;/a&gt;</pre><br />If other users click on my innocent link, I have their cookies:<br /><br /><a href="http://3.bp.blogspot.com/-G5gvanGzYso/TcJ4Y21jlrI/AAAAAAAAABo/dBxxlOCeNCU/s1600/image00.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5603173254834656946" src="http://3.bp.blogspot.com/-G5gvanGzYso/TcJ4Y21jlrI/AAAAAAAAABo/dBxxlOCeNCU/s400/image00.png" style="cursor: hand; cursor: pointer; display: block; height: 210px; margin: 0px auto 10px; text-align: center; width: 300px;" /></a><br /><br />You can learn how to find XSS vulnerabilities in your own web app and how to fix them in the second part of <a href="http://google-gruyere.appspot.com/part2">Gruyere</a>; or, if you’re an advanced developer, take a look at the automatic escaping features in template systems we blogged about previously on <a href="http://googleonlinesecurity.blogspot.com/2009/03/reducing-xss-by-way-of-automatic.html">this blog</a>.<br /><br /><span style="font-weight: bold;">Cross-site request forgery (XSRF) - Should I trust requests from evil.com?</span><br /><br /><a href="http://3.bp.blogspot.com/-oGUWkyOcgVI/TcJ5Jlnc02I/AAAAAAAAAB4/W2LgndPdgLE/s1600/image03.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5603174092025680738" src="http://3.bp.blogspot.com/-oGUWkyOcgVI/TcJ5Jlnc02I/AAAAAAAAAB4/W2LgndPdgLE/s400/image03.png" style="cursor: hand; cursor: pointer; float: left; height: 80px; margin: 0 10px 10px 0; width: 250px;" /></a> Oops, a broken picture. It can’t be dangerous--it’s broken, after all--which means that the URL of the image returns a 404 or it’s just malformed. Is that true in all of the cases?<br /><br />No, it’s not! You can specify any URL as an image source, regardless of its content type. It can be an HTML page, a JavaScript file, or some other potentially malicious resource. In this case the image source was a simple page’s URL:<br /><br /><a href="http://4.bp.blogspot.com/-W5Kf2VzGYQ4/TcJ5YqZ5qJI/AAAAAAAAACA/a7ir-pIueG0/s1600/image02.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5603174351009065106" src="http://4.bp.blogspot.com/-W5Kf2VzGYQ4/TcJ5YqZ5qJI/AAAAAAAAACA/a7ir-pIueG0/s400/image02.png" style="cursor: hand; cursor: pointer; display: block; height: 50px; margin: 0px auto 10px; text-align: center; width: 400px;" /></a><br /><br />That page will only work if I’m logged in and I have some cookies set. Since I was actually logged in to the application, when the browser tried to fetch the image by accessing the image source URL, it also deleted my first snippet. This doesn’t sound particularly dangerous, but if I’m a bit familiar with the app, I could also invoke a URL which deletes a user’s profile or lets admins grant permissions for other users.<br /><br />To protect your app against XSRF you should not allow state changing actions to be called via GET; the POST method was invented for this kind of state-changing request. This change alone may have mitigated the above attack, but usually it's not enough and you need to include an unpredictable value in all state changing requests to prevent XSRF. Please head to <a href="http://google-gruyere.appspot.com/part3">Gruyere</a> if you want to learn more about XSRF.<br /><br /><span style="font-weight: bold;">Cross-site script inclusion (XSSI) - All your script are belong to us</span><br /><br />Many sites today can dynamically update a page's content via asynchronous JavaScript  requests that return JSON data. Sometimes, JSON can contain sensitive data, and if the correct precautions are not in place, it may be possible for an attacker to steal this sensitive information.<br /><br />Let’s imagine the following scenario: I have created a standard HTML page and send you the link; since you trust me, you visit the link I sent you. The page contains only a few lines:<br /><pre>&lt;script&gt;function _feed(s) {alert("Your private snippet is: " + s['private_snippet']);}&lt;/script&gt;&lt;script src="http://google-gruyere.appspot.com/611788451095/feed.gtl"&gt;&lt;/script&gt;</pre><br />Since you’re signed in to Gruyere and you have a private snippet, you’ll see an alert box on my page informing you about the contents of your snippet. As always, if I managed to fire up an alert box, I can do whatever else I want; in this case it was a simple snippet, but it could have been your biggest secret, too.<br /><br />It’s not too hard to defend your app against XSSI, but it still requires careful thinking. You can use tokens as explained in the XSRF section, set your script to answer only POST requests, or simply start the JSON response with ‘\n’ to make sure the script is not executable.<br /><br /><span style="font-weight: bold;">SQL Injection - Still think user input is safe?</span><br /><br />What will happen if I try to sign in to your app with a username like<br /><pre style="text-align: center;">JohnDoe’; DROP TABLE members;--</pre><br />While this specific example won’t expose user data, it can cause great headaches because it has the potential to completely remove the SQL table where your app stores information about members.<br /><br />Generally, you can protect your app from SQL injection with proactive thinking and input validation. First, are you sure the SQL user needs to have permission to execute “DROP TABLE members”? Wouldn’t it be enough to grant only SELECT rights? By setting the SQL user’s permissions carefully, you can avoid painful experiences and lots of troubles. You might also want to configure error reporting in such way that the database and its tables’ names aren’t exposed in the case of a failed query.<br />Second, as we learned in the XSS case, never trust user input: what looks like a login form to you, looks like a potential doorway to an attacker. Always sanitize and quotesafe the input that will be stored in a database, and whenever possible make use of statements generally referred to as prepared or parametrized statements available in most database programming interfaces.<br /><br />Knowing how web applications can be exploited is the first step in understanding how to defend them. In light of this, we encourage you to take the <a href="http://google-gruyere.appspot.com/">Gruyere course</a>, take other web security courses from the <a href="http://code.google.com/edu/security/index.html">Google Code University</a> and check out <a href="http://code.google.com/p/skipfish/wiki/SkipfishDoc">skipfish</a> if you're looking for an automated web application security testing tool. If you have more questions please post them in our <a href="http://www.google.com/support/forum/p/Webmasters/browse?hl=en">Webmaster Help Forum</a>.</div></div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-9008002394805788310?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/website-security-for-webmasters/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Improving SSL certificate security</title>
		<link>https://googledata.org/google-online-security/improving-ssl-certificate-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=improving-ssl-certificate-security</link>
		<comments>https://googledata.org/google-online-security/improving-ssl-certificate-security/#comments</comments>
		<pubDate>Fri, 01 Apr 2011 16:05:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=49974f989ca63fcd58d300187e0a13bc</guid>
		<description><![CDATA[Posted by Ben Laurie, Google Security TeamIn the wake of the recent Comodo fraud incident, there has been a great deal of speculation about how to improve the public key infrastructure, on which the security of the Internet rests. Unfortunately, this i...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Ben Laurie, Google Security Team</span><br /><br />In the wake of the recent <a href="http://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html">Comodo fraud incident</a>, there has been a great deal of speculation about how to improve the public key infrastructure, on which the security of the Internet rests. Unfortunately, this isn’t a problem that will be fixed overnight. Luckily, however, experts have long known about these issues and have been devising solutions for some time.<br /><br />Given the current interest it seems like a good time to talk about two projects in which Google is engaged.<br /><br />The first is the Google Certificate Catalog. Google’s web crawlers scan the web on a regular basis in order to provide our search and other services. In the process, we also keep a record of all the SSL certificates we see. The Google Certificate Catalog is a database of all of those certificates, published in DNS. So, for example, if you wanted to see what we think of <a href="https://www.google.com/">https://www.google.com/</a>’s certificate, you could do this:<br /><br /><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;">$ <b>openssl s_client -connect www.google.com:443 &lt; /dev/null | openssl x509 -outform DER | openssl sha1</b><br />depth=1 /C=ZA/O=Thawte Consulting (Pty) Ltd./CN=Thawte SGC CA<br />verify error:num=20:unable to get local issuer certificate<br />verify return:0<br />DONE<br />405062e5befde4af97e9382af16cc87c8fb7c4e2<br />$ <b>dig +short 405062e5befde4af97e9382af16cc87c8fb7c4e2.certs.googlednstest.com TXT</b><br />"14867 15062 74"</span><br /><br />In other words: take the SHA-1 hash of the certificate, represent it as a hexadecimal number, then look up a TXT record with that name in the <span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;">certs.googlednstest.com</span> domain. What you get back is a set of three numbers. The first number is the day that Google’s crawlers first saw that certificate, the second is the most recent day, and the third is the number of days we saw it in between.<br /><br />In order for the hash of a certificate to appear in our database, it must satisfy some criteria:<br /><ul><li>It must be correctly signed (either by a CA or self-signed).</li><li>It must have the correct domain name — that is, one that matches the one we used to retrieve the certificate.</li></ul>The basic idea is that if a certificate doesn’t appear in our database, despite being correctly signed by a well-known CA and having a matching domain name, then there may be something suspicious about that certificate. This endeavor owes much to the excellent <a href="http://www.networknotary.org/">Perspectives</a> project, but it is a somewhat different approach.<br /><br />Accessing the data manually is rather difficult and painful, so we’re thinking about how to add opt-in support to the Chrome browser. We hope other browsers will in time consider acting similarly.<br /><br />The second initiative to discuss is the <a href="https://datatracker.ietf.org/wg/dane/charter/">DANE Working Group at the IETF</a>. DANE stands for DNS-based Authentication of Named Entities. In short, the idea is to allow domain operators to publish information about SSL certificates used on their hosts. It should be possible, using DANE DNS records, to specify particular certificates which are valid, or CAs that are allowed to sign certificates for those hosts. So, once more, if a certificate is seen that isn’t consistent with the DANE records, it should be treated with suspicion. Related to the DANE effort is the individually contributed <a href="http://tools.ietf.org/html/draft-hallambaker-donotissue-03">CAA record</a>, which predates the DANE WG and provides similar functionality.<br /><br />One could rightly point out that both of these efforts rely on DNS, which is not secure. Luckily we’ve been working on that problem for even longer than this one, and a reasonable answer is DNSSEC, which enables publishing DNS records that are cryptographically protected against forgery and modification.<br /><br />It will be some time before DNSSEC is deployed widely enough for DANE to be broadly useful, since DANE requires every domain to be able to use DNSSEC. However, work is on the way to use DNSSEC for the Certificate Catalog well before the entire DNSSEC infrastructure is ready. If we publish a key for the domain in which we publish the catalog, clients can simply incorporate this key as an interim measure until DNSSEC is properly deployed.<br /><br />Improving the public key infrastructure of the web is a big task and one that’s going to require the cooperation of many parties to be widely effective. We hope these projects will help point us in the right direction.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-2029461104519147234?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/improving-ssl-certificate-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chrome warns users of out-of-date browser plugins</title>
		<link>https://googledata.org/google-online-security/chrome-warns-users-of-out-of-date-browser-plugins/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=chrome-warns-users-of-out-of-date-browser-plugins</link>
		<comments>https://googledata.org/google-online-security/chrome-warns-users-of-out-of-date-browser-plugins/#comments</comments>
		<pubDate>Thu, 31 Mar 2011 18:04:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=4169882c28ded7ebd2fe97c6757c1c57</guid>
		<description><![CDATA[Posted by Panayiotis Mavrommatis and Noé Lutz, Google Security TeamThe new version of Google Chrome is not only speedier and simpler but it also improves user security by automatically disabling out-of-date, vulnerable browser plugins.As browsers get ...]]></description>
				<content:encoded><![CDATA[<div style="text-align: center;"><br /></div><span class="byline-author">Posted by Panayiotis Mavrommatis and Noé Lutz, Google Security Team</span><br /><br />The new version of Google Chrome is not only <a href="http://chrome.blogspot.com/2011/03/speedier-simpler-and-safer-chromes.html">speedier and simpler</a> but it also improves user security by automatically disabling out-of-date, vulnerable browser plugins.<br /><br />As browsers get better at auto-updating, out-of-date plugins are becoming the weakest link against malware attacks. Thousands of web sites are compromised every week, turning those sites into malware distribution vectors by actively exploiting out-of-date plugins that run in the browser. Simply visiting one of these sites is usually enough to get your computer infected.<br /><br />Keeping all of your plugins up-to-date with the latest security fixes can be a hassle, so a while ago we started using our 20% time to develop a solution. The initial implementation was a Chrome extension called <a href="https://chrome.google.com/extensions/detail/pgkcfihepeihdlfphbndagmompiakeci">“SecBrowsing,”</a> which kept track of the latest plugin versions and encouraged users to update accordingly. The extension helped us gather valuable knowledge about plugins, and we started working with the Chrome team to build the feature right inside the browser.<br /><br />With the latest version of Chrome, users will be automatically warned about any out-of-date plugins. If you run into a page that requires a plugin that’s not current, it won’t run by default. Instead, you’ll see a message that will help you get the latest, most secure version of the plugin. An example of this message is below, and you can read more about the feature at the <a href="http://blog.chromium.org/2011/03/mini-newsletter-from-your-google-chrome.html">Chromium blog</a>.<br /><br /><div><img src="http://3.bp.blogspot.com/-a4wFYvCMaOU/TZTKJdi3-qI/AAAAAAAAAkQ/i0gUISzUrdU/s400/out+of+date+plugin.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 146px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5590315301372164770" /></div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-6482786953427442924?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/chrome-warns-users-of-out-of-date-browser-plugins/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>MHTML vulnerability under active exploitation</title>
		<link>https://googledata.org/google-online-security/mhtml-vulnerability-under-active-exploitation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mhtml-vulnerability-under-active-exploitation</link>
		<comments>https://googledata.org/google-online-security/mhtml-vulnerability-under-active-exploitation/#comments</comments>
		<pubDate>Fri, 11 Mar 2011 22:13:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=653ff5b62248d93c03e32ebf43609e2e</guid>
		<description><![CDATA[Posted by Chris Evans, Robert Swiecki, Michal Zalewski, and Billy Rios, Google Security TeamWe’ve noticed some highly targeted and apparently politically motivated attacks against our users. We believe activists may have been a specific target. We’...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Chris Evans, Robert Swiecki, Michal Zalewski, and Billy Rios, Google Security Team</span><br /><br />We’ve noticed some highly targeted and apparently politically motivated attacks against our users. We believe activists may have been a specific target. We’ve also seen attacks against users of another popular social site. All these attacks abuse a publicly-disclosed <a href="http://lcamtuf.blogspot.com/2011/03/note-on-mhtml-vulnerability.html">MHTML vulnerability</a> for which an exploit was publicly posted in January 2011. Users browsing with the Internet Explorer browser are affected.<br /><br />For now, we recommend concerned users and corporations seriously consider <a href="http://support.microsoft.com/kb/2501696">deploying Microsoft’s temporary Fixit</a> to block this attack until an official patch is available.<br /><br />To help protect users of our services, we have deployed various server-side defenses to make the MHTML vulnerability harder to exploit. That said, these are not tenable long-term solutions, and we can’t guarantee them to be 100% reliable or comprehensive.  We’re working with Microsoft to develop a comprehensive solution for this issue.<br /><br />The abuse of this vulnerability is also interesting because it represents a new quality in the exploitation of web-level vulnerabilities. To date, similar attacks focused on directly compromising users' systems, as opposed to leveraging vulnerabilities to interact with web<br />services.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-6431747515119342935?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/mhtml-vulnerability-under-active-exploitation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Advanced sign-in security for your Google account</title>
		<link>https://googledata.org/google-online-security/advanced-sign-in-security-for-your-google-account/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=advanced-sign-in-security-for-your-google-account</link>
		<comments>https://googledata.org/google-online-security/advanced-sign-in-security-for-your-google-account/#comments</comments>
		<pubDate>Thu, 10 Feb 2011 20:02:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Nishit Shah, Product Manager, Google Security(Cross-posted from the Official Google Blog)Has anyone you know ever lost control of an email account and inadvertently sent spam—or worse—to their friends and family? There are plenty of examp...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Nishit Shah, Product Manager, Google Security</span><br /><br /><i>(Cross-posted from the <a href="http://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html">Official Google Blog</a>)</i><br /><br />Has anyone you know ever lost control of an email account and inadvertently sent spam—or worse—to their friends and family? There are plenty of examples (like the classic <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">"Mugged in London" scam</a>) that demonstrate why it's important to take steps to help secure your activities online. Your Gmail account, your photos, your private documents—if you reuse the same password on multiple sites and one of those sites gets hacked, or your password is conned out of you directly through a phishing scam, it can be used to access some of your most closely-held information.<br /><br />Most of us are used to entrusting our information to a password, but we know that some of you are looking for something stronger. As we announced to our Google Apps customers <a href="http://googleenterprise.blogspot.com/2010/09/more-secure-cloud-for-millions-of.html">a few months ago</a>, we've developed an advanced opt-in security feature called <i>2-step verification</i> that makes your Google Account significantly more secure by helping to verify that you're the real owner of your account. Now it's time to offer the same advanced protection to all of our users.<br /><br />2-step verification requires two independent factors for authentication, much like you might see on your banking website: your password, plus a code obtained using your phone. Over the next few days, you'll see a new link on your <a href="https://www.google.com/accounts/ManageAccount">Account Settings page</a> that looks like this:<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_7ZYqYi4xigk/TVQNzQVV3AI/AAAAAAAAHi4/gNMXEZj5bJk/s1600/account+settings+page.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 383px; height: 207px;" src="http://1.bp.blogspot.com/_7ZYqYi4xigk/TVQNzQVV3AI/AAAAAAAAHi4/gNMXEZj5bJk/s400/account+settings+page.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5572093813173115906" /></a><br />Take your time to carefully set up 2-step verification—we expect it may take up to 15 minutes to enroll. A user-friendly set-up wizard will guide you through the process, including setting up a backup phone and creating backup codes in case you lose access to your primary phone. Once you enable 2-step verification, you'll see an extra page that prompts you for a code when you sign in to your account. After entering your password, Google will call you with the code, send you an SMS message or give you the choice to generate the code for yourself using a mobile application on your Android, BlackBerry or iPhone device. The choice is up to you. When you enter this code after correctly submitting your password we'll have a pretty good idea that the person signing in is actually you.<div><br /><a href="http://4.bp.blogspot.com/_7ZYqYi4xigk/TVQNzPylGNI/AAAAAAAAHiw/a17WfSok6h0/s1600/step+1-2.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 500px;" src="http://4.bp.blogspot.com/_7ZYqYi4xigk/TVQNzPylGNI/AAAAAAAAHiw/a17WfSok6h0/step+1-2.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5572093813027313874" /></a><br />It's an extra step, but it's one that significantly improves the security of your Google Account because it requires the powerful combination of both something you <i>know</i>—your username and password—and something that only you should <i>have</i>—your phone. A hacker would need access to both of these factors to gain access to your account. If you like, you can always choose a "Remember verification for this computer for 30 days" option, and you won't need to re-enter a code for another 30 days. You can also set up one-time <i>application-specific passwords</i> to sign in to your account from non-browser based applications that are designed to only ask for a password, and cannot prompt for the code.<br /><br />To learn more about 2-step verification and get started, visit our <a href="http://www.google.com/support/accounts/bin/answer.py?answer=180744">Help Center</a>. And for more about staying safe online, see our ongoing <a href="http://googleblog.blogspot.com/search/label/security">security blog series</a> or visit <a href="http://www.staysafeonline.org/">http://www.staysafeonline.org/</a>. Be safe!<br /><br /></div></div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-3813461209748256544?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/advanced-sign-in-security-for-your-google-account/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Advanced sign-in security for your Google account</title>
		<link>https://googledata.org/google-online-security/advanced-sign-in-security-for-your-google-account-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=advanced-sign-in-security-for-your-google-account-2</link>
		<comments>https://googledata.org/google-online-security/advanced-sign-in-security-for-your-google-account-2/#comments</comments>
		<pubDate>Thu, 10 Feb 2011 20:02:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=e5e126093edfed90da3daa8387383986</guid>
		<description><![CDATA[Posted by Nishit Shah, Product Manager, Google Security(Cross-posted from the Official Google Blog)Has anyone you know ever lost control of an email account and inadvertently sent spam—or worse—to their friends and family? There are plenty of examp...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Nishit Shah, Product Manager, Google Security</span><br /><br /><i>(Cross-posted from the <a href="http://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html">Official Google Blog</a>)</i><br /><br />Has anyone you know ever lost control of an email account and inadvertently sent spam—or worse—to their friends and family? There are plenty of examples (like the classic <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">"Mugged in London" scam</a>) that demonstrate why it's important to take steps to help secure your activities online. Your Gmail account, your photos, your private documents—if you reuse the same password on multiple sites and one of those sites gets hacked, or your password is conned out of you directly through a phishing scam, it can be used to access some of your most closely-held information.<br /><br />Most of us are used to entrusting our information to a password, but we know that some of you are looking for something stronger. As we announced to our Google Apps customers <a href="http://googleenterprise.blogspot.com/2010/09/more-secure-cloud-for-millions-of.html">a few months ago</a>, we've developed an advanced opt-in security feature called <i>2-step verification</i> that makes your Google Account significantly more secure by helping to verify that you're the real owner of your account. Now it's time to offer the same advanced protection to all of our users.<br /><br />2-step verification requires two independent factors for authentication, much like you might see on your banking website: your password, plus a code obtained using your phone. Over the next few days, you'll see a new link on your <a href="https://www.google.com/accounts/ManageAccount">Account Settings page</a> that looks like this:<br /><div><br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-7ED-NjokTKA/Tt_YfAhMBcI/AAAAAAAAIx0/norP7_KGsmE/s1600/AccountSettings.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="251" src="http://2.bp.blogspot.com/-7ED-NjokTKA/Tt_YfAhMBcI/AAAAAAAAIx0/norP7_KGsmE/s400/AccountSettings.png" width="400" /></a></div><div style="text-align: center;"><br /></div>Take your time to carefully set up 2-step verification—we expect it may take up to 15 minutes to enroll. A user-friendly set-up wizard will guide you through the process, including setting up a backup phone and creating backup codes in case you lose access to your primary phone. Once you enable 2-step verification, you'll see an extra page that prompts you for a code when you sign in to your account. After entering your password, Google will call you with the code, send you an SMS message or give you the choice to generate the code for yourself using a mobile application on your Android, BlackBerry or iPhone device. The choice is up to you. When you enter this code after correctly submitting your password we'll have a pretty good idea that the person signing in is actually you.<br /><div><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/-z1MrzrMJMxQ/Tt_YbIKoMFI/AAAAAAAAIxs/1OVcbqkNZ_o/s1600/step1and2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-z1MrzrMJMxQ/Tt_YbIKoMFI/AAAAAAAAIxs/1OVcbqkNZ_o/s500/step1and2.png" width="500" /></a></div><div style="text-align: center;"><br /></div>It's an extra step, but it's one that significantly improves the security of your Google Account because it requires the powerful combination of both something you <i>know</i>—your username and password—and something that only you should <i>have</i>—your phone. A hacker would need access to both of these factors to gain access to your account. If you like, you can always choose a "Remember verification for this computer for 30 days" option, and you won't need to re-enter a code for another 30 days. You can also set up one-time <i>application-specific passwords</i> to sign in to your account from non-browser based applications that are designed to only ask for a password, and cannot prompt for the code.<br /><br />To learn more about 2-step verification and get started, visit our <a href="http://www.google.com/support/accounts/bin/answer.py?answer=180744">Help Center</a>. And for more about staying safe online, see our ongoing <a href="http://googleblog.blogspot.com/search/label/security">security blog series</a> or visit <a href="http://www.staysafeonline.org/">http://www.staysafeonline.org/</a>. Be safe!<br /><br /><i><b>Update</b></i> <i>Dec 7, 2011</i>: Updated the screenshots in this post.</div></div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-3813461209748256544?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/advanced-sign-in-security-for-your-google-account-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Quick update on our vulnerability reward program</title>
		<link>https://googledata.org/uncategorized/quick-update-on-our-vulnerability-reward-program-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=quick-update-on-our-vulnerability-reward-program-2</link>
		<comments>https://googledata.org/uncategorized/quick-update-on-our-vulnerability-reward-program-2/#comments</comments>
		<pubDate>Fri, 12 Nov 2010 00:10:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=a3e248d53cc2406c4a25735816d90d78</guid>
		<description><![CDATA[Posted by Matt Moore, Michal Zalewski, Adam Mein, Chris Evans; Google Security TeamAbout a week and a half ago we launched a new web vulnerability reward program, and the response has been fantastic. We've received many high quality reports from across...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Matt Moore, Michal Zalewski, Adam Mein, Chris Evans; Google Security Team</span><br /><br />About a week and a half ago we launched a new <a href="http://googleonlinesecurity.blogspot.com/2010/11/rewarding-web-application-security.html">web vulnerability reward program</a>, and the response has been fantastic. We've received many high quality reports from across the globe. Our bug review committee has been working hard, and we’re pleased to say that so far we plan to award over $20,000 to various talented researchers. We'll update our 'Hall of Fame' page with relevant details over the next few days.<br /><br />Based on what we've received over the past week, we've <a href="http://www.google.com/corporate/rewardprogram.html">clarified</a> a few things about the program — in particular, the types of issues and Google services that are in scope for a reward. The review committee has been somewhat generous this first week, and we’ve granted a number of awards for bugs of low severity, or that wouldn’t normally fall under the conditions we originally described. Please be sure to review our <a href="http://googleonlinesecurity.blogspot.com/2010/11/rewarding-web-application-security.html">original post</a> and <a href="http://www.google.com/corporate/rewardprogram.html">clarification</a> thoroughly before reporting a potential issue to us.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7782890792074920522?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/quick-update-on-our-vulnerability-reward-program-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Quick update on our vulnerability reward program</title>
		<link>https://googledata.org/google-online-security/quick-update-on-our-vulnerability-reward-program/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=quick-update-on-our-vulnerability-reward-program</link>
		<comments>https://googledata.org/google-online-security/quick-update-on-our-vulnerability-reward-program/#comments</comments>
		<pubDate>Fri, 12 Nov 2010 00:10:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Matt Moore, Michal Zalewski, Adam Mein, Chris Evans; Google Security TeamAbout a week and a half ago we launched a new web vulnerability reward program, and the response has been fantastic. We've received many high quality reports from across...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Matt Moore, Michal Zalewski, Adam Mein, Chris Evans; Google Security Team</span><br /><br />About a week and a half ago we launched a new <a href="http://googleonlinesecurity.blogspot.com/2010/11/rewarding-web-application-security.html">web vulnerability reward program</a>, and the response has been fantastic. We've received many high quality reports from across the globe. Our bug review committee has been working hard, and we’re pleased to say that so far we plan to award over $20,000 to various talented researchers. We'll update our 'Hall of Fame' page with relevant details over the next few days.<br /><br />Based on what we've received over the past week, we've <a href="http://www.google.com/corporate/rewardprogram.html">clarified</a> a few things about the program — in particular, the types of issues and Google services that are in scope for a reward. The review committee has been somewhat generous this first week, and we’ve granted a number of awards for bugs of low severity, or that wouldn’t normally fall under the conditions we originally described. Please be sure to review our <a href="http://googleonlinesecurity.blogspot.com/2010/11/rewarding-web-application-security.html">original post</a> and <a href="http://www.google.com/corporate/rewardprogram.html">clarification</a> thoroughly before reporting a potential issue to us.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7782890792074920522?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/quick-update-on-our-vulnerability-reward-program/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rewarding web application security research</title>
		<link>https://googledata.org/uncategorized/rewarding-web-application-security-research-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rewarding-web-application-security-research-2</link>
		<comments>https://googledata.org/uncategorized/rewarding-web-application-security-research-2/#comments</comments>
		<pubDate>Mon, 01 Nov 2010 19:30:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=9916e9d21d6e27762a8691cb09d3fb60</guid>
		<description><![CDATA[Posted by Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski; Google Security TeamBack in January of this year, the Chromium open source project launched a well-received vulnerability reward program. In the months since launch, researc...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski; Google Security Team</span><br /><br />Back in January of this year, the Chromium open source project <a href="http://blog.chromium.org/2010/01/encouraging-more-chromium-security.html">launched a well-received vulnerability reward program</a>. In the months since launch, researchers reporting a wide range of great bugs have received rewards — a small summary of which can be found in the <a href="http://dev.chromium.org/Home/chromium-security/hall-of-fame">Hall of Fame</a>. We've seen a sustained increase in the number of high quality reports from researchers, and their combined efforts are contributing to a more secure Chromium browser for millions of users.<br /><br />Today, we are announcing an experimental new vulnerability reward program that applies to Google web properties. We already enjoy working with an array of researchers to improve Google security, and some individuals who have provided high caliber reports are listed on <a href="http://www.google.com/corporate/security.html">our credits page</a>. As well as enabling us to thank regular contributors in a new way, we hope our new program will attract new researchers and the types of reports that help make our users safer.<br /><br />In the spirit of the original Chromium blog post, we have some information about the new program in a question and answer format below:<br /><br /><b>Q) What applications are in scope?</b><br />A) Any Google web properties which display or manage highly sensitive authenticated user data or accounts may be in scope. Some examples could include:<br /><ul><li>*.google.com</li><li>*.youtube.com</li><li>*.blogger.com</li><li>*.orkut.com</li></ul>For now, Google's client applications (e.g. Android, Picasa, Google Desktop, etc) are not in scope. We may expand the program in the future.<div><br /></div><div>UPDATE: We also recommend reading our <a href="http://www.google.com/corporate/rewardprogram.html">additional thoughts</a> about these guidelines to help clarify what types of applications and bugs are eligible for this program.<br /><br /><b>Q) What classes of bug are in scope? </b><br />A) It's difficult to provide a definitive list of vulnerabilities that will be rewarded; however, any serious bug which directly affects the confidentiality or integrity of user data may be in scope. We anticipate most rewards will be in bug categories such as:<br /><ul><li>XSS</li><li>XSRF / CSRF</li><li>XSSI (cross-site script inclusion)</li><li>Bypassing authorization controls (e.g. User A can access User B's private data)</li><li>Server side code execution or command injection</li></ul>Out of concern for the availability of our services to all users, we ask you to refrain from using automated testing tools.<br /><br />These categories of bugs are definitively excluded:<br /><ul><li>attacks against Google’s corporate infrastructure</li><li>social engineering and physical attacks</li><li>denial of service bugs</li><li>non-web application vulnerabilities, including vulnerabilities in client applications</li><li>SEO blackhat techniques</li><li>vulnerabilities in Google-branded websites hosted by third parties</li><li>bugs in technologies recently acquired by Google</li></ul><b>Q) How far should I go to demonstrate a vulnerability?</b><br />A) Please, only ever target your own account or a test account. Never attempt to access anyone else's data. Do not engage in any activity that bombards Google services with large numbers of requests or large volumes of data.<br /><br /><b>Q) I've found a vulnerability — how do I report it?</b><br />A) Contact details are <a href="http://www.google.com/corporate/security.html">listed here</a>. Please only use the email address given for actual vulnerabilities in Google products. Non-security bugs and queries about problems with your account should should instead be directed to the <a href="http://www.google.com/support/">Google Help Centers</a>.<br /><br /><b>Q) What reward might I get?</b><br />A) The base reward for qualifying bugs is $500. If the rewards panel finds a particular bug to be severe or unusually clever, rewards of up to $3,133.7 may be issued. The panel may also decide a single report actually constitutes multiple bugs requiring reward, or that multiple reports constitute only a single reward.<br /><br />We understand that some researchers aren’t interested in the money, so we’d also like to give you the option to donate your reward to charity. If you do, we'll match it — subject to our discretion.<br /><br />Regardless of whether you're rewarded monetarily or not, all vulnerability reporters who interact with us in a respectful, productive manner will be credited on a new vulnerability reporter page. If we file a bug internally, you'll be credited.<br /><br />Superstar performers will continue to be acknowledged under the "We Thank You" section of <a href="http://www.google.com/corporate/security.html">this</a> page.<br /><br /><b>Q) How do I find out if my bug qualified for a reward?</b><br />A) You will receive a comment to this effect in an emailed response from the Google Security Team.<br /><br /><b>Q) What if someone else also found the same bug</b>?<br />A) Only the first report of a given issue that we had not yet identified is eligible. In the event of a duplicate submission, only the earliest received report is considered.<br /><br /><b>Q) Will bugs disclosed without giving Google developers an opportunity to fix them first still qualify?</b><br />A) <a href="http://googleonlinesecurity.blogspot.com/2010/07/rebooting-responsible-disclosure-focus.html">We believe</a> handling vulnerabilities responsibly is a two-way street. It's our job to fix serious bugs within a reasonable time frame, and we in turn request advance, private notice of any issues that are uncovered. Vulnerabilities that are disclosed to any party other than Google, except for the purposes of resolving the vulnerability (for example, an issue affecting multiple vendors), will usually not qualify. This includes both full public disclosure and limited private release.<br /><br /><b>Q) Do I still qualify if I disclose the problem publicly once fixed?</b><br />A) Yes, absolutely! We encourage open collaboration. We will also make sure to credit you on our new vulnerability reporter page.<br /><br /><b>Q) Who determines whether a given bug is eligible?</b><br />A) Several members of the Google Security Team including Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski.<br /><br /><b>Q) Are you going to list my name on a public web page?</b><br />A) Only if you want us to. If selected as the recipient of a reward, and you accept, we will need your contact details in order to pay you. However, at your discretion, you can choose not to be listed on any credit page.<br /><br /><b>Q) No doubt you wanted to make some legal points?</b><br />A) Sure. We encourage broad participation. However, we are unable to issue rewards to individuals who are on sanctions lists, or who are in countries (e.g. Cuba, Iran, North Korea, Sudan and Syria) on sanctions lists. This program is also not open to minors. You are responsible for any tax implications depending on your country of residency and citizenship. There may be additional restrictions on your ability to enter depending upon your local law.<br /><br />This is not a competition, but rather an experimental and discretionary rewards program. You should understand that we can cancel the program at any time, and the decision as to whether or not to pay a reward has to be entirely at our discretion.<br /><br />Of course, your testing must not violate any law, or disrupt or compromise any data that is not your own.<br /><br />Thank you for helping us to make Google's products more secure. We look forward to issuing our first reward in this new program.</div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7147046743093191966?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/rewarding-web-application-security-research-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rewarding web application security research</title>
		<link>https://googledata.org/google-online-security/rewarding-web-application-security-research/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rewarding-web-application-security-research</link>
		<comments>https://googledata.org/google-online-security/rewarding-web-application-security-research/#comments</comments>
		<pubDate>Mon, 01 Nov 2010 19:30:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski; Google Security TeamBack in January of this year, the Chromium open source project launched a well-received vulnerability reward program. In the months since launch, researc...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski; Google Security Team</span><br /><br />Back in January of this year, the Chromium open source project <a href="http://blog.chromium.org/2010/01/encouraging-more-chromium-security.html">launched a well-received vulnerability reward program</a>. In the months since launch, researchers reporting a wide range of great bugs have received rewards — a small summary of which can be found in the <a href="http://dev.chromium.org/Home/chromium-security/hall-of-fame">Hall of Fame</a>. We've seen a sustained increase in the number of high quality reports from researchers, and their combined efforts are contributing to a more secure Chromium browser for millions of users.<br /><br />Today, we are announcing an experimental new vulnerability reward program that applies to Google web properties. We already enjoy working with an array of researchers to improve Google security, and some individuals who have provided high caliber reports are listed on <a href="http://www.google.com/corporate/security.html">our credits page</a>. As well as enabling us to thank regular contributors in a new way, we hope our new program will attract new researchers and the types of reports that help make our users safer.<br /><br />In the spirit of the original Chromium blog post, we have some information about the new program in a question and answer format below:<br /><br /><b>Q) What applications are in scope?</b><br />A) Any Google web properties which display or manage highly sensitive authenticated user data or accounts may be in scope. Some examples could include:<br /><ul><li>*.google.com</li><li>*.youtube.com</li><li>*.blogger.com</li><li>*.orkut.com</li></ul>For now, Google's client applications (e.g. Android, Picasa, Google Desktop, etc) are not in scope. We may expand the program in the future.<div><br /></div><div>UPDATE: We also recommend reading our <a href="http://www.google.com/corporate/rewardprogram.html">additional thoughts</a> about these guidelines to help clarify what types of applications and bugs are eligible for this program.<br /><br /><b>Q) What classes of bug are in scope? </b><br />A) It's difficult to provide a definitive list of vulnerabilities that will be rewarded; however, any serious bug which directly affects the confidentiality or integrity of user data may be in scope. We anticipate most rewards will be in bug categories such as:<br /><ul><li>XSS</li><li>XSRF / CSRF</li><li>XSSI (cross-site script inclusion)</li><li>Bypassing authorization controls (e.g. User A can access User B's private data)</li><li>Server side code execution or command injection</li></ul>Out of concern for the availability of our services to all users, we ask you to refrain from using automated testing tools.<br /><br />These categories of bugs are definitively excluded:<br /><ul><li>attacks against Google’s corporate infrastructure</li><li>social engineering and physical attacks</li><li>denial of service bugs</li><li>non-web application vulnerabilities, including vulnerabilities in client applications</li><li>SEO blackhat techniques</li><li>vulnerabilities in Google-branded websites hosted by third parties</li><li>bugs in technologies recently acquired by Google</li></ul><b>Q) How far should I go to demonstrate a vulnerability?</b><br />A) Please, only ever target your own account or a test account. Never attempt to access anyone else's data. Do not engage in any activity that bombards Google services with large numbers of requests or large volumes of data.<br /><br /><b>Q) I've found a vulnerability — how do I report it?</b><br />A) Contact details are <a href="http://www.google.com/corporate/security.html">listed here</a>. Please only use the email address given for actual vulnerabilities in Google products. Non-security bugs and queries about problems with your account should should instead be directed to the <a href="http://www.google.com/support/">Google Help Centers</a>.<br /><br /><b>Q) What reward might I get?</b><br />A) The base reward for qualifying bugs is $500. If the rewards panel finds a particular bug to be severe or unusually clever, rewards of up to $3,133.7 may be issued. The panel may also decide a single report actually constitutes multiple bugs requiring reward, or that multiple reports constitute only a single reward.<br /><br />We understand that some researchers aren’t interested in the money, so we’d also like to give you the option to donate your reward to charity. If you do, we'll match it — subject to our discretion.<br /><br />Regardless of whether you're rewarded monetarily or not, all vulnerability reporters who interact with us in a respectful, productive manner will be credited on a new vulnerability reporter page. If we file a bug internally, you'll be credited.<br /><br />Superstar performers will continue to be acknowledged under the "We Thank You" section of <a href="http://www.google.com/corporate/security.html">this</a> page.<br /><br /><b>Q) How do I find out if my bug qualified for a reward?</b><br />A) You will receive a comment to this effect in an emailed response from the Google Security Team.<br /><br /><b>Q) What if someone else also found the same bug</b>?<br />A) Only the first report of a given issue that we had not yet identified is eligible. In the event of a duplicate submission, only the earliest received report is considered.<br /><br /><b>Q) Will bugs disclosed without giving Google developers an opportunity to fix them first still qualify?</b><br />A) <a href="http://googleonlinesecurity.blogspot.com/2010/07/rebooting-responsible-disclosure-focus.html">We believe</a> handling vulnerabilities responsibly is a two-way street. It's our job to fix serious bugs within a reasonable time frame, and we in turn request advance, private notice of any issues that are uncovered. Vulnerabilities that are disclosed to any party other than Google, except for the purposes of resolving the vulnerability (for example, an issue affecting multiple vendors), will usually not qualify. This includes both full public disclosure and limited private release.<br /><br /><b>Q) Do I still qualify if I disclose the problem publicly once fixed?</b><br />A) Yes, absolutely! We encourage open collaboration. We will also make sure to credit you on our new vulnerability reporter page.<br /><br /><b>Q) Who determines whether a given bug is eligible?</b><br />A) Several members of the Google Security Team including Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski.<br /><br /><b>Q) Are you going to list my name on a public web page?</b><br />A) Only if you want us to. If selected as the recipient of a reward, and you accept, we will need your contact details in order to pay you. However, at your discretion, you can choose not to be listed on any credit page.<br /><br /><b>Q) No doubt you wanted to make some legal points?</b><br />A) Sure. We encourage broad participation. However, we are unable to issue rewards to individuals who are on sanctions lists, or who are in countries (e.g. Cuba, Iran, North Korea, Sudan and Syria) on sanctions lists. This program is also not open to minors. You are responsible for any tax implications depending on your country of residency and citizenship. There may be additional restrictions on your ability to enter depending upon your local law.<br /><br />This is not a competition, but rather an experimental and discretionary rewards program. You should understand that we can cancel the program at any time, and the decision as to whether or not to pay a reward has to be entirely at our discretion.<br /><br />Of course, your testing must not violate any law, or disrupt or compromise any data that is not your own.<br /><br />Thank you for helping us to make Google's products more secure. We look forward to issuing our first reward in this new program.</div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7147046743093191966?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/rewarding-web-application-security-research/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>This Internet is Your Internet: Digital Citizenship from California to Washtenaw County</title>
		<link>https://googledata.org/uncategorized/this-internet-is-your-internet-digital-citizenship-from-california-to-washtenaw-county-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=this-internet-is-your-internet-digital-citizenship-from-california-to-washtenaw-county-2</link>
		<comments>https://googledata.org/uncategorized/this-internet-is-your-internet-digital-citizenship-from-california-to-washtenaw-county-2/#comments</comments>
		<pubDate>Thu, 21 Oct 2010 18:33:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=96452d72027f02f6cbcb8c81015bef50</guid>
		<description><![CDATA[Posted by Adrienne St. Aubin, Public Policy AnalystIn the physical world, basic safety measures are second-nature to almost everyone (look both ways, stop drop and roll!). In the digital world, however, many of us expect security to be handled on our b...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Adrienne St. Aubin, Public Policy Analyst</span><br /><br />In the physical world, basic safety measures are second-nature to almost everyone (look both ways, stop drop and roll!). In the digital world, however, many of us expect security to be handled on our behalf by experts, or come in a single-box solution. Together, we must reset those expectations.<br /><br />The Internet is the biggest neighborhood in the world. Security-related initiatives in the technology sector and government play an important role in making the Internet safer, but efforts from Silicon Valley and Washington, D.C. alone are not enough. Much of the important work that needs to be done must happen closer to home—wherever that may be.<br /><br />As part of <a href="http://googleblog.blogspot.com/2010/10/national-cyber-security-awareness-month.html">National Cyber Security Awareness Month</a> I recently traveled from California to Washtenaw County, MI to speak to group of local community leaders, educators, business owners, law enforcement officials and residents who recently formed the <a href="http://washtenawcybercoalition.org/">Washtenaw Cyber Citizenship Coalition</a>. They are working to create a digitally aware, knowledgeable and more secure community by providing residents with the tools and resources to be good digital citizens. No one in the room self-identified as a “cyber security expert,” but the information sharing that’s happening in Washtenaw County is the kind of holistic effort that can enable everyone to use the Internet more safely and benefit from the great opportunities that it provides.<br /><br />The Washtenaw Cyber Citizenship Coalition is channeling the community’s efforts through volunteer workgroups in areas such as public/private partnerships, awareness, education and law enforcement. Their strategy is to “share the wheel" whenever possible, instead of recreating it. They’ve collected tips and resources for kids, parents, businesses, educators and crime victims so that citizens can find and access these materials with ease.<br /><br />If you are interested in raising awareness in your own community, <a href="http://www.staysafeonline.org/">staysafeonline.org</a>, <a href="http://www.stopthinkconnect.org">stopthinkconnect.org</a> and <a href="http://www.onguardonline.gov">onguardonline.gov</a> are examples of sites that offer such materials for public use.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-3635103819389992565?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/this-internet-is-your-internet-digital-citizenship-from-california-to-washtenaw-county-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting your data in the cloud</title>
		<link>https://googledata.org/google-online-security/protecting-your-data-in-the-cloud/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-your-data-in-the-cloud</link>
		<comments>https://googledata.org/google-online-security/protecting-your-data-in-the-cloud/#comments</comments>
		<pubDate>Fri, 15 Oct 2010 16:38:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Priya Nayak, Consumer Operations, Google AccountsLike many people, you probably store a lot of important information in your Google Account. I personally check my Gmail account every day (sometimes several times a day) and rely on having acce...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Priya Nayak, Consumer Operations, Google Accounts</span><br /><br />Like many people, you probably store a lot of important information in your Google Account. I personally check my Gmail account every day (sometimes several times a day) and rely on having access to my mail and contacts wherever I go. Aside from Gmail, my Google Account is tied to lots of other services that help me manage my life and interests: photos, documents, blogs, calendars, and more. That is to say, my Google Account is very valuable to me.<br /><br />Unfortunately, a Google Account is also valuable in the eyes of spammers and other people looking to do harm. It’s not so much about your specific account, but rather the fact that your friends and family see your Google Account as trustworthy. A perfect example is the <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">“Mugged in London” phishing scam</a> that aims to trick your contacts into wiring money — ostensibly to help you out. If your account is compromised and used to send these messages, your well-meaning friends may find themselves out a chunk of change. If you have sensitive information in your account, it may also be at risk of improper access.<br /><br />As part of <a href="http://googleblog.blogspot.com/2010/10/national-cyber-security-awareness-month.html">National Cyber Security Awareness month</a>, we want to let you know what you can do to better protect your Google Account.<br /><br /><b>Stay one step ahead of the bad guys</b><br /><br />Account hijackers prey on the bad habits of the average Internet user. Understanding common hijacking techniques and using better security practices will help you stay one step ahead of them.<br /><br />The most common ways hijackers can get access to your Google password are:<div><ul><li><b>Password re-use</b>: You sign up for an account on a third-party site with your Google username and password. If that site is hacked and your sign-in information is discovered, the hijacker has easy access to your Google Account.</li><li><b>Malware</b>: You use a computer with infected software that is designed to steal your passwords as you type (“keylogging”) or grab them from your browser’s cache data.</li><li><b>Phishing</b>: You respond to a website, email, or phone call that claims to come from a legitimate organization and asks for your username and password.</li><li><b>Brute force</b>: You use a password that’s easy to guess, like your first or last name plus your birth date (“Laura1968”), or you provide an answer to a secret question that’s common and therefore easy to guess, like “pizza” for “What is your favorite food?”</li></ul>As you can see, hijackers have many tactics for stealing your password, and it’s important to be aware of all of them.<br /><br /><b>Take control of your account security across the web </b><br /><br />Online accounts that share passwords are like a line of dominoes: When one falls, it doesn’t take much for the others to fall, too. This is why you should choose unique passwords for important accounts like Gmail (your Google Account), your bank, commerce sites, and social networking sites. We’re also <a href="http://googleonlinesecurity.blogspot.com/2010/09/moving-security-beyond-passwords.html">working on technology</a> that adds another layer of protection beyond your password to make your Google Account significantly more secure.<br /><br />Choosing a unique password is not enough to secure your Google Account against every possible threat. That’s why we’ve created an easy-to-use <a href="http://mail.google.com/support/bin/static.py?page=checklist.cs&amp;tab=29488">checklist</a> to help you secure your computer, browser, Gmail, and Google Account. We encourage you to go through the entire checklist, but want to highlight these tips:<br /><ul><li><b>Never re-use passwords</b> for your important accounts like online banking, email, social networking, and commerce.</li><li><b>Change your password periodically</b>, and be sure to do so for important accounts whenever you suspect one of them may have been at risk. Don’t just change your password by a few letters or numbers (“Aquarius5” to “Aquarius6”); change the combination of letters and numbers to something unique each time.</li><li><b>Never respond to messages, non-Google websites, or phone calls</b> asking for your Google username or password; a legitimate organization will not ask you for this type of information. <a href="http://mail.google.com/support/bin/answer.py?hl=en&amp;answer=184963">Report these messages</a> to us so we can take action. If you responded and can no longer access your account, <a href="https://www.google.com/accounts/recovery?hl=en">visit our account recovery page</a>.</li></ul>We hope you’ll take action to ensure your security across the web, not just on Google. Run regular virus scans, don’t re-use your passwords, and keep your software and <a href="http://www.google.com/support/accounts/bin/answer.py?hl=en&amp;answer=183723">account recovery information</a> up to date. These simple yet powerful steps can make a difference when it really counts.</div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-2216743235851549551?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/protecting-your-data-in-the-cloud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting your data in the cloud</title>
		<link>https://googledata.org/uncategorized/protecting-your-data-in-the-cloud-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-your-data-in-the-cloud-2</link>
		<comments>https://googledata.org/uncategorized/protecting-your-data-in-the-cloud-2/#comments</comments>
		<pubDate>Fri, 15 Oct 2010 16:38:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=a74a53b6e5168ba0998bba161a0b2375</guid>
		<description><![CDATA[Posted by Priya Nayak, Consumer Operations, Google AccountsLike many people, you probably store a lot of important information in your Google Account. I personally check my Gmail account every day (sometimes several times a day) and rely on having acce...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Priya Nayak, Consumer Operations, Google Accounts</span><br /><br />Like many people, you probably store a lot of important information in your Google Account. I personally check my Gmail account every day (sometimes several times a day) and rely on having access to my mail and contacts wherever I go. Aside from Gmail, my Google Account is tied to lots of other services that help me manage my life and interests: photos, documents, blogs, calendars, and more. That is to say, my Google Account is very valuable to me.<br /><br />Unfortunately, a Google Account is also valuable in the eyes of spammers and other people looking to do harm. It’s not so much about your specific account, but rather the fact that your friends and family see your Google Account as trustworthy. A perfect example is the <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">“Mugged in London” phishing scam</a> that aims to trick your contacts into wiring money — ostensibly to help you out. If your account is compromised and used to send these messages, your well-meaning friends may find themselves out a chunk of change. If you have sensitive information in your account, it may also be at risk of improper access.<br /><br />As part of <a href="http://googleblog.blogspot.com/2010/10/national-cyber-security-awareness-month.html">National Cyber Security Awareness month</a>, we want to let you know what you can do to better protect your Google Account.<br /><br /><b>Stay one step ahead of the bad guys</b><br /><br />Account hijackers prey on the bad habits of the average Internet user. Understanding common hijacking techniques and using better security practices will help you stay one step ahead of them.<br /><br />The most common ways hijackers can get access to your Google password are:<div><ul><li><b>Password re-use</b>: You sign up for an account on a third-party site with your Google username and password. If that site is hacked and your sign-in information is discovered, the hijacker has easy access to your Google Account.</li><li><b>Malware</b>: You use a computer with infected software that is designed to steal your passwords as you type (“keylogging”) or grab them from your browser’s cache data.</li><li><b>Phishing</b>: You respond to a website, email, or phone call that claims to come from a legitimate organization and asks for your username and password.</li><li><b>Brute force</b>: You use a password that’s easy to guess, like your first or last name plus your birth date (“Laura1968”), or you provide an answer to a secret question that’s common and therefore easy to guess, like “pizza” for “What is your favorite food?”</li></ul>As you can see, hijackers have many tactics for stealing your password, and it’s important to be aware of all of them.<br /><br /><b>Take control of your account security across the web </b><br /><br />Online accounts that share passwords are like a line of dominoes: When one falls, it doesn’t take much for the others to fall, too. This is why you should choose unique passwords for important accounts like Gmail (your Google Account), your bank, commerce sites, and social networking sites. We’re also <a href="http://googleonlinesecurity.blogspot.com/2010/09/moving-security-beyond-passwords.html">working on technology</a> that adds another layer of protection beyond your password to make your Google Account significantly more secure.<br /><br />Choosing a unique password is not enough to secure your Google Account against every possible threat. That’s why we’ve created an easy-to-use <a href="http://mail.google.com/support/bin/static.py?page=checklist.cs&amp;tab=29488">checklist</a> to help you secure your computer, browser, Gmail, and Google Account. We encourage you to go through the entire checklist, but want to highlight these tips:<br /><ul><li><b>Never re-use passwords</b> for your important accounts like online banking, email, social networking, and commerce.</li><li><b>Change your password periodically</b>, and be sure to do so for important accounts whenever you suspect one of them may have been at risk. Don’t just change your password by a few letters or numbers (“Aquarius5” to “Aquarius6”); change the combination of letters and numbers to something unique each time.</li><li><b>Never respond to messages, non-Google websites, or phone calls</b> asking for your Google username or password; a legitimate organization will not ask you for this type of information. <a href="http://mail.google.com/support/bin/answer.py?hl=en&amp;answer=184963">Report these messages</a> to us so we can take action. If you responded and can no longer access your account, <a href="https://www.google.com/accounts/recovery?hl=en">visit our account recovery page</a>.</li></ul>We hope you’ll take action to ensure your security across the web, not just on Google. Run regular virus scans, don’t re-use your passwords, and keep your software and <a href="http://www.google.com/support/accounts/bin/answer.py?hl=en&amp;answer=183723">account recovery information</a> up to date. These simple yet powerful steps can make a difference when it really counts.</div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-2216743235851549551?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/protecting-your-data-in-the-cloud-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Moving security beyond passwords</title>
		<link>https://googledata.org/google-online-security/moving-security-beyond-passwords-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=moving-security-beyond-passwords-2</link>
		<comments>https://googledata.org/google-online-security/moving-security-beyond-passwords-2/#comments</comments>
		<pubDate>Mon, 20 Sep 2010 09:14:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=e5c7b4367fbf532f1184862edc2f997c</guid>
		<description><![CDATA[Posted by Travis McCoy, Product Manager, Google Security TeamEntering your username and password on a standard website gives you access to everything from your email and bank accounts to your favorite social networking site. Your passwords possess a lo...]]></description>
				<content:encoded><![CDATA[<div><span class="byline-author">Posted by Travis McCoy, Product Manager, Google Security Team</span><br /><br />Entering your username and password on a standard website gives you access to everything from your email and bank accounts to your favorite social networking site. Your passwords possess a lot of power, so it's critical to keep them from falling into the wrong hands. Unfortunately, we often find that passwords are the weakest link in the security chain. Keeping track of many passwords is a pain, and unfortunately accounts are regularly compromised when passwords are too weak, are reused across websites, or when people are tricked into sharing their password with someone untrustworthy. These are difficult industry problems to solve, and when re-thinking the traditional username/password design, we wanted to do more.<br /><br />As we explained today on our <a href="http://googleenterprise.blogspot.com/2010/09/more-secure-cloud-for-millions-of.html">Google Enterprise Blog</a>, we've developed an option to add two-step verification to Google Apps accounts. When signing in, Google will send a verification code to your phone, or let you generate one yourself using an application on your Android, BlackBerry or iPhone device. Entering this code, in addition to a normal password, gives us a strong indication that the person signing in is actually you. This new feature significantly improves the security of your Google Account, as it requires not only something you know: your username and password, but also something that only you should have: your phone. Even if someone has stolen your password, they'll need more than that to access your account.</div><div><br /></div><div><br /></div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_YHyItmug5A4/TJbxnR4j3DI/AAAAAAAAAjI/QTnkZ7e4-go/s1600/dggtdpb9_142hfn2v3g9_b.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 207px;" src="http://1.bp.blogspot.com/_YHyItmug5A4/TJbxnR4j3DI/AAAAAAAAAjI/QTnkZ7e4-go/s400/dggtdpb9_142hfn2v3g9_b.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5518864050506947634" /></a><br />Building the technology and infrastructure to support this kind of feature has taken careful thought. We wanted to develop a security feature that would be easy to use and not get in your way. Along those lines, we're offering a variety of sign in options, along with the ability to indicate when you're using a computer you trust and don't want to be asked for a verification code from that machine in the future. Making this service available to millions of users at no cost took a great deal of coordination across Google’s specialized infrastructure, from building a scalable SMS and voice call system to developing open source mobile applications for your smart phone. The result is a feature we hope you'll find simple to manage and that makes it easy to better protect your account.<br /><br />We look forward to gathering feedback about this feature and making it available to all of our users in the coming months.<br /><br />If you'd like to learn more about about staying safe online, see our ongoing security <a href="http://googleblog.blogspot.com/search/label/security">blog series</a> or visit <a href="http://www.staysafeonline.org/">http://www.staysafeonline.org/</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-5458337917289983048?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/moving-security-beyond-passwords-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Moving security beyond passwords</title>
		<link>https://googledata.org/google-online-security/moving-security-beyond-passwords/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=moving-security-beyond-passwords</link>
		<comments>https://googledata.org/google-online-security/moving-security-beyond-passwords/#comments</comments>
		<pubDate>Mon, 20 Sep 2010 09:14:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Travis McCoy, Product Manager, Google Security TeamEntering your username and password on a standard website gives you access to everything from your email and bank accounts to your favorite social networking site. Your passwords possess a lo...]]></description>
				<content:encoded><![CDATA[<div><span class="byline-author">Posted by Travis McCoy, Product Manager, Google Security Team</span><br /><br />Entering your username and password on a standard website gives you access to everything from your email and bank accounts to your favorite social networking site. Your passwords possess a lot of power, so it's critical to keep them from falling into the wrong hands. Unfortunately, we often find that passwords are the weakest link in the security chain. Keeping track of many passwords is a pain, and unfortunately accounts are regularly compromised when passwords are too weak, are reused across websites, or when people are tricked into sharing their password with someone untrustworthy. These are difficult industry problems to solve, and when re-thinking the traditional username/password design, we wanted to do more.<br /><br />As we explained today on our <a href="http://googleenterprise.blogspot.com/2010/09/more-secure-cloud-for-millions-of.html">Google Enterprise Blog</a>, we've developed an option to add two-step verification to Google Apps accounts. When signing in, Google will send a verification code to your phone, or let you generate one yourself using an application on your Android, BlackBerry or iPhone device. Entering this code, in addition to a normal password, gives us a strong indication that the person signing in is actually you. This new feature significantly improves the security of your Google Account, as it requires not only something you know: your username and password, but also something that only you should have: your phone. Even if someone has stolen your password, they'll need more than that to access your account.</div><div><br /></div><div><br /></div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_YHyItmug5A4/TJbxnR4j3DI/AAAAAAAAAjI/QTnkZ7e4-go/s1600/dggtdpb9_142hfn2v3g9_b.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 207px;" src="http://1.bp.blogspot.com/_YHyItmug5A4/TJbxnR4j3DI/AAAAAAAAAjI/QTnkZ7e4-go/s400/dggtdpb9_142hfn2v3g9_b.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5518864050506947634" /></a><br />Building the technology and infrastructure to support this kind of feature has taken careful thought. We wanted to develop a security feature that would be easy to use and not get in your way. Along those lines, we're offering a variety of sign in options, along with the ability to indicate when you're using a computer you trust and don't want to be asked for a verification code from that machine in the future. Making this service available to millions of users at no cost took a great deal of coordination across Google’s specialized infrastructure, from building a scalable SMS and voice call system to developing open source mobile applications for your smart phone. The result is a feature we hope you'll find simple to manage and that makes it easy to better protect your account.<br /><br />We look forward to gathering feedback about this feature and making it available to all of our users in the coming months.<br /><br />If you'd like to learn more about about staying safe online, see our ongoing security <a href="http://googleblog.blogspot.com/search/label/security">blog series</a> or visit <a href="http://www.staysafeonline.org/">http://www.staysafeonline.org/</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-5458337917289983048?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/moving-security-beyond-passwords/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Vulnerability trends: how are companies really doing?</title>
		<link>https://googledata.org/google-online-security/vulnerability-trends-how-are-companies-really-doing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vulnerability-trends-how-are-companies-really-doing</link>
		<comments>https://googledata.org/google-online-security/vulnerability-trends-how-are-companies-really-doing/#comments</comments>
		<pubDate>Mon, 30 Aug 2010 23:17:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Adam Mein, Google Security TeamQuite a few security companies and organizations produce vulnerability databases, cataloguing bugs and reporting trends across the industry based on the data they compile. There is value in this exercise; specif...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Adam Mein, Google Security Team</span><br /><br />Quite a few security companies and organizations produce vulnerability databases, cataloguing bugs and reporting trends across the industry based on the data they compile. There is value in this exercise; specifically, getting a look at examples across a range of companies and industries gives us information about the most common types of threats, as well as how they are distributed.<br /><br />Unfortunately, the data behind these reports is commonly inaccurate or outdated to some degree. The truth is that maintaining an accurate and reliable database of this type of information is a significant challenge. We most recently saw this reality play out last week after the appearance of the IBM X-Force® 2010 Mid-Year Trend and Risk Report. We questioned a number of surprising findings concerning Google’s vulnerability rate and response record, and after discussions with IBM, we discovered a number of errors that had important implications for the report’s conclusions. IBM worked together with us and promptly <a href="http://blogs.iss.net/archive/midyear2010chartupda.html">issued a correction</a> to address the inaccuracies.<br /><br />Google maintains a Product Security Response Team that prioritizes bug reports and coordinates their handling across relevant engineering groups. Unsurprisingly, particular attention is paid to high-risk and critical vulnerabilities. For this reason, we were confused by a claim that 33% of critical and high-risk bugs uncovered in our services in the first half of 2010 were left unpatched. We learned after investigating that the 33% figure referred to a single unpatched vulnerability out of a total of three — and importantly, the one item that was considered unpatched was only mistakenly considered a security vulnerability due to a <a href="http://blogs.technet.com/b/srd/archive/2009/01/28/stack-overflow-stack-exhaustion-not-the-same-as-stack-buffer-overflow.aspx">terminology mix-up</a>. As a result, the true unpatched rate for these high-risk bugs is 0 out of 2, or 0%.<br /><br />How do these types of errors occur? Maintainers of vulnerability databases have a number of factors working against them:<br /><ul><li>Vendors disclose their vulnerabilities in inconsistent formats, using different severity classifications. This makes the process of measuring the number of total vulnerabilities assigned to a given vendor much more difficult.</li><li>Assessing the severity, scope, and nature of a bug sometimes requires intimate knowledge of a product or technology, and this can lead to errors and misinterpretation.</li><li>Keeping the fix status updated for thousands of entries is no small task, and we’ve consistently seen long-fixed errors marked as unfixed in a number of databases.</li><li>Not all compilers of vulnerability databases perform their own independent verification of bugs they find reported from other sources. As a result, errors in one source can be replicated to others.</li></ul>To make these databases more useful for the industry and less likely to spread misinformation, we feel there must be more frequent collaboration between vendors and compilers. As a first step, database compilers should reach out to vendors they plan to cover in order to devise a sustainable solution for both parties that will allow for a more consistent flow of information. Another big improvement would be increased transparency on the part of the compilers — for example, the inclusion of more hard data, the methodology behind the data gathering, and caveat language acknowledging the limitations of the presented data. We hope to see these common research practices employed more broadly to increase the quality and usefulness of vulnerability trend reports.<b><br /></b><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-4047578002591663886?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/vulnerability-trends-how-are-companies-really-doing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rebooting Responsible Disclosure: a focus on protecting end users</title>
		<link>https://googledata.org/google-online-security/rebooting-responsible-disclosure-a-focus-on-protecting-end-users/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rebooting-responsible-disclosure-a-focus-on-protecting-end-users</link>
		<comments>https://googledata.org/google-online-security/rebooting-responsible-disclosure-a-focus-on-protecting-end-users/#comments</comments>
		<pubDate>Tue, 20 Jul 2010 21:07:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Chris Evans, Eric Grosse, Neel Mehta, Matt Moore, Tavis Ormandy, Julien Tinnes, Michal Zalewski; Google Security TeamVulnerability disclosure policies have become a hot topic in recent years. Security researchers generally practice “respons...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Chris Evans, Eric Grosse, Neel Mehta, Matt Moore, Tavis Ormandy, Julien Tinnes, Michal Zalewski; Google Security Team</span><div><br /></div>Vulnerability disclosure policies have become a hot topic in recent years. Security researchers generally practice “responsible disclosure”, which involves privately notifying affected software vendors of vulnerabilities. The vendors then typically address the vulnerability at some later date, and the researcher reveals full details publicly at or after this time.<br /><br />A competing philosophy, "full disclosure", involves the researcher making full details of a vulnerability available to everybody simultaneously, giving no preferential treatment to any single party.<br /><br />The argument for responsible disclosure goes briefly thus: by giving the vendor the chance to patch the vulnerability before details are public, end users of the affected software are not put at undue risk, and are safer. Conversely, the argument for full disclosure proceeds: because a given bug may be under active exploitation, full disclosure enables immediate preventative action, and pressures vendors for fast fixes. Speedy fixes, in turn, make users safer by reducing the number of vulnerabilities available to attackers at any given time.<br /><br />Note that there's no particular consensus on which disclosure policy is safer for users. Although responsible disclosure is more common, we recommend this <a href="http://www.schneier.com/crypto-gram-0111.html">2001 post by Bruce Schneier</a> as background reading on some of the advantages and disadvantages of both approaches.<br /><br />So, is the current take on responsible disclosure working to best protect end users in 2010? Not in all cases, no. The emotionally loaded name suggests that it is the most responsible way to conduct vulnerability research - but if we define being responsible as doing whatever it best takes to make end users safer, we will find a disconnect. We’ve seen an increase in vendors invoking the principles of “responsible” disclosure to delay fixing vulnerabilities indefinitely, sometimes for years; in that timeframe, these flaws are often rediscovered and used by rogue parties using the same tools and methodologies used by ethical researchers. The important implication of referring to this process as "responsible" is that researchers who do not comply are seen as behaving improperly. However, the inverse situation is often true: it can be irresponsible to permit a flaw to remain live for such an extended period of time.<br /><br />Skilled attackers are using 0-day vulnerabilities in the wild, and there are increasing instances of:<br /><ul><li>0-day attacks that rely on vulnerabilities known to the vendor for a long while.</li></ul><ul><li>Situations where it became clear that a vulnerability was being actively exploited in the wild, subsequent to the bug being fixed or disclosed.</li></ul>Accordingly, we believe that responsible disclosure is a two-way street. Vendors, as well as researchers, must act responsibly. Serious bugs should be fixed within a reasonable timescale. Whilst every bug is unique, we would suggest that 60 days is a reasonable upper bound for a genuinely critical issue in widely deployed software. This time scale is only meant to apply to critical issues. Some bugs are mischaracterized as “critical", but we look to established guidelines to help make these important distinctions — e.g. <a href="http://sites.google.com/a/chromium.org/dev/developers/severity-guidelines">Chromium severity guidelines</a> and <a href="https://wiki.mozilla.org/Security_Severity_Ratings">Mozilla severity ratings</a>.<br /><br />As software engineers, we understand the pain of trying to fix, test and release a product rapidly; this especially applies to widely-deployed and complicated client software. Recognizing this, we put a lot of effort into keeping our release processes agile so that security fixes can be pushed out to users as quickly as possible.<br /><br />A lot of talented security researchers work at Google. These researchers discover many vulnerabilities in products from vendors across the board, and they share a detailed analysis of their findings with vendors to help them get started on patch development. We will be supportive of the following practices by our researchers:<br /><ul><li>Placing a disclosure deadline on any serious vulnerability they report, consistent with complexity of the fix. (For example, a design error needs more time to address than a simple memory corruption bug).</li></ul><ul><li>Responding to a missed disclosure deadline or refusal to address the problem by publishing an analysis of the vulnerability, along with any suggested workarounds.</li></ul><ul><li>Setting an aggressive disclosure deadline where there exists evidence that blackhats already have knowledge of a given bug.</li></ul>We of course expect to be held to the same standards ourselves. We recognize that we’ve handled bug reports in the past where we’ve been unable to meet reasonable publication deadlines -- due to unexpected dependencies, code complexity, or even simple mix-ups. In other instances, we’ve simply disagreed with a researcher on the scope or severity of a bug. In all these above cases, we’ve been happy for publication to proceed, and grateful for the heads-up.<br /><br />We would invite other researchers to join us in using the proposed disclosure deadlines to drive faster security response efforts. Creating pressure towards more reasonably-timed fixes will result in smaller windows of opportunity for blackhats to abuse vulnerabilities. In our opinion, this small tweak to the rules of engagement will result in greater overall safety for users of the Internet.<br /><br /><b>Update September 10, 2010:</b> We'd like to clarify a few of the points above about how we approach the issue of vulnerability disclosure. While we believe vendors have an obligation to be responsive, the 60 day period before public notification about critical bugs is not intended to be a punishment for unresponsive vendors. We understand that not all bugs can be fixed in 60 days, although many can and should be. Rather, we thought of 60 days when considering how large the window of exposure for a critical vulnerability should be permitted to grow before users are best served by hearing enough details to make a decision about implementing possible mitigations, such as disabling a service, restricting access, setting a killbit, or contacting the vendor for more information. In most cases, we don't feel it's in people's best interest to be kept in the dark about critical vulnerabilities affecting their software for any longer period.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-3992357910581335187?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/rebooting-responsible-disclosure-a-focus-on-protecting-end-users/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Extending SSL to Google search</title>
		<link>https://googledata.org/google-online-security/extending-ssl-to-google-search/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=extending-ssl-to-google-search</link>
		<comments>https://googledata.org/google-online-security/extending-ssl-to-google-search/#comments</comments>
		<pubDate>Fri, 21 May 2010 19:32:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Murali Viswanathan, Product ManagerGoogle understands the potential risks of browsing the web on an unsecured network, particularly when information is sent over the wire unencrypted — as it is for most major websites today. That’s why we...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Murali Viswanathan, Product Manager</span><br /><br />Google understands the potential risks of browsing the web on an unsecured network, particularly when information is sent over the wire unencrypted — as it is for most major websites today. That’s why we offered SSL support for Gmail back when we launched the product in 2004. Most other webmail providers don’t provide this feature even today. We’ve since added SSL support for Calendar, Docs, Sites, and several other products. Additionally, early this year we made SSL the <a href="http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html">default setting</a> for all Gmail users.<br /><br />As we work to provide more support for SSL across our products, today we’re introducing the ability to search with Google over SSL. We still have some testing to do, but you can try out the new encrypted version of Google search at <a href="https://www.google.com">https://www.google.com</a> and read more about it on the <a href="http://googleblog.blogspot.com/2010/05/search-more-securely-with-encrypted.html">Official Google Blog</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-5679778229344173003?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/extending-ssl-to-google-search/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do Know Evil: web application vulnerabilities</title>
		<link>https://googledata.org/google-online-security/do-know-evil-web-application-vulnerabilities/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=do-know-evil-web-application-vulnerabilities</link>
		<comments>https://googledata.org/google-online-security/do-know-evil-web-application-vulnerabilities/#comments</comments>
		<pubDate>Tue, 04 May 2010 15:19:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Bruce Leban, Software EngineerUPDATE July 13: We have changed the name of the codelab application to Gruyere. The codelab is now located at http://google-gruyere.appspot.com.We want Google employees to have a firm understanding of the threats...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Bruce Leban, Software Engineer</span><br /><br /><b>UPDATE July 13: We have changed the name of the codelab application to Gruyere. The codelab is now located at <a href="http://google-gruyere.appspot.com/">http://google-gruyere.appspot.com</a>.</b><br /><br />We want Google employees to have a firm understanding of the threats our services face, as well as how to help protect against those threats. We work toward these goals in a variety of ways, including security training for new engineers, technical presentations about security, and other types of documentation. We also use codelabs — interactive programming tutorials that walk participants through specific programming tasks.<br /><br />One codelab in particular teaches developers about common types of web application vulnerabilities. In the spirit of the thinking that "it takes a hacker to catch a hacker," the codelab also demonstrates how an attacker could exploit such vulnerabilities.<br /><br />We're releasing this codelab, entitled "Web Application Exploits and Defenses," today in coordination with <a href="http://code.google.com/edu/">Google Code University</a> and <a href="http://www.googlelabs.com/">Google Labs</a> to help software developers better recognize, fix, and avoid similar flaws in their own applications. The codelab is built around Gruyere, a small yet full-featured microblogging application designed to contain lots of security bugs. The vulnerabilities covered by the lab include cross-site scripting (XSS), cross-site request forgery (XSRF) and cross-site script inclusion (XSSI), as well as client-state manipulation, path traversal and AJAX and configuration vulnerabilities. It also shows how simple bugs can lead to information disclosure, denial-of-service and remote code execution.<br /><br />The maxim, "given enough eyeballs, all bugs are shallow" is only true if the eyeballs know what to look for. To that end, the security bugs in Gruyere are real bugs — just like those in many other applications. The Gruyere source code is published under a Creative Commons license and is available for use in whitebox hacking exercises or in computer science classes covering security, software engineering or general software development.<br /><br />To get started, visit <a href="http://google-gruyere.appspot.com/">http://google-gruyere.appspot.com</a>. An instructor's guide for using the codelab is now available on <a href="http://code.google.com/edu/">Google Code University</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-5417664826047042477?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/do-know-evil-web-application-vulnerabilities/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Rise of Fake Anti-Virus</title>
		<link>https://googledata.org/google-online-security/the-rise-of-fake-anti-virus/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-rise-of-fake-anti-virus</link>
		<comments>https://googledata.org/google-online-security/the-rise-of-fake-anti-virus/#comments</comments>
		<pubDate>Wed, 14 Apr 2010 15:55:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Niels Provos, Security TeamFor years, we have detected malicious content on the web and helped protect users from it. Vulnerabilities in web browsers and popular plugins have resulted in an increased number of users whose systems can be compr...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Niels Provos, Security Team</span><br />For years, we have detected malicious content on the web and helped protect users from it. Vulnerabilities in web browsers and popular plugins have resulted in an increased number of users whose systems can be compromised by attacks known as drive-by downloads. Such attacks do not require any user interaction, and they allow the adversary to execute code on a user’s computer without their knowledge. However, even without any vulnerabilities present, clever social engineering attacks can cause an unsuspecting user to unwittingly install malicious code supplied by an attacker on their computer.<br /><br />One increasingly prevalent threat is the spread of Fake Anti-Virus (Fake AV) products. This malicious software takes advantage of users’ fear that their computer is vulnerable, as well as their desire to take the proper corrective action. Visiting a malicious or compromised web site — or sometimes even viewing a malicious ad — can produce a screen looking something like the following:<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_YHyItmug5A4/S8Xj-_v8RJI/AAAAAAAAAgk/RdaxawXBy2A/s1600/screenshot1-cropped.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 255px;" src="http://3.bp.blogspot.com/_YHyItmug5A4/S8Xj-_v8RJI/AAAAAAAAAgk/RdaxawXBy2A/s400/screenshot1-cropped.png" alt="" id="BLOGGER_PHOTO_ID_5460020794660504722" border="0" /></a><span class="byline-author"><a onblur="try  {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_YHyItmug5A4/S8XjdxqzZOI/AAAAAAAAAgc/9h3LyHdez_s/s1600/screenshot1-cropped.png"><br /></a></span>At Google, we have been working to help protect users against Fake AV threats on the web since we first discovered them in March 2007. In addition to protections like adding warnings to browsers and search results, we’re also actively engaged in malware research. We conducted an in-depth analysis of the prevalence of Fake AV over the course of the last 13 months, and the research paper containing our findings, “<a href="http://www.usenix.org/event/leet10/tech/techAbstracts.html#Rajab">The Nocebo Effect on the Web: An Analysis of Fake AV distribution</a>” is going to be presented at the <a href="http://www.usenix.org/event/leet10/tech/">Workshop on Large-Scale Exploits and Emergent Threats</a> (LEET) in San Jose, CA on April 27th. While we do not want to spoil any surprises, here are a few previews. Our analysis of 240 million web pages over the 13 months of our study uncovered over 11,000 domains involved in Fake AV distribution — or, roughly 15% of the malware domains we detected on the web during that period.<br /><br />Also, over the last year, the lifespan of domains distributing Fake AV attacks has decreased significantly:<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_YHyItmug5A4/S8Xkn_ebLEI/AAAAAAAAAgs/Ig7Qrh93y9k/s1600/lifespan.quants.png"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 400px; height: 281px;" src="http://2.bp.blogspot.com/_YHyItmug5A4/S8Xkn_ebLEI/AAAAAAAAAgs/Ig7Qrh93y9k/s400/lifespan.quants.png" alt="" id="BLOGGER_PHOTO_ID_5460021498961669186" border="0" /></a><br />In the meantime, we recommend only running antivirus and antispyware products from <a href="http://www.google.com/support/accounts/bin/answer.py?hl=en&amp;answer=88072">trusted companies</a>. Be sure to use the latest versions of this software, and if the scan detects any suspicious programs or applications, remove them immediately.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-4165830279131104560?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/the-rise-of-fake-anti-virus/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>The chilling effects of malware</title>
		<link>https://googledata.org/google-online-security/the-chilling-effects-of-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-chilling-effects-of-malware</link>
		<comments>https://googledata.org/google-online-security/the-chilling-effects-of-malware/#comments</comments>
		<pubDate>Tue, 30 Mar 2010 21:05:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Neel Mehta, Security TeamIn January, we discussed a set of highly sophisticated cyber attacks that originated in China and targeted many corporations around the world. We believe that malware is a general threat to the Internet, but it is esp...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Neel Mehta, Security Team</span><br /><br />In January, we <a href="http://googleblog.blogspot.com/2010/01/new-approach-to-china.html">discussed</a> a set of highly sophisticated cyber attacks that originated in China and targeted many corporations around the world. We believe that malware is a general threat to the Internet, but it is especially harmful when it is used to suppress opinions of dissent. In that case, the attacks involved surveillance of email accounts belonging to Chinese human rights activists. Perhaps unsurprisingly, these are not the only examples of malicious software being used for political ends. We have gathered information about a separate cyber threat that was less sophisticated but that nonetheless was employed against another community.<br /><br />This particular malware broadly targeted Vietnamese computer users around the world. The malware infected the computers of potentially tens of thousands of users who downloaded Vietnamese keyboard language software and possibly other legitimate software that was altered to infect users. While the malware itself was not especially sophisticated, it has nonetheless been used for damaging purposes. These infected machines have been used both to spy on their owners as well as participate in distributed denial of service (DDoS) attacks against blogs containing messages of political dissent. Specifically, these attacks have tried to squelch opposition to bauxite mining efforts in Vietnam, an important and emotionally charged issue in the country.<br /><br />Since some anti-virus vendors have already introduced signatures to help detect this specific malware, we recommend the following actions, particularly if you believe that you may have been exposed to the malware: run regular anti-virus as well as anti-spyware scans from trusted vendors, and be sure to install all web browser and operating system updates to ensure you’re using only the latest versions. New technology like our <a href="http://gmailblog.blogspot.com/2010/03/detecting-suspicious-account-activity.html">suspicious account activity alerts</a> in Gmail should also help detect surveillance efforts. At a larger scale, we feel the international community needs to take cybersecurity seriously to help keep free opinion flowing.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-406878011483723114?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/the-chilling-effects-of-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Federal Support for Federated Login</title>
		<link>https://googledata.org/google-online-security/federal-support-for-federated-login/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=federal-support-for-federated-login</link>
		<comments>https://googledata.org/google-online-security/federal-support-for-federated-login/#comments</comments>
		<pubDate>Wed, 03 Mar 2010 13:36:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Eric Sachs, Senior Product Manager, Google SecurityLast November, we discussed the progress that account login systems operating via standards-based identity technologies like OpenID have achieved across the web. As more websites seek to inte...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Eric Sachs, Senior Product Manager, Google Security</span><br /><br />Last November, we <a href="http://googleblog.blogspot.com/2009/11/cutting-back-on-your-long-list-of.html">discussed the progress</a> that account login systems operating via standards-based identity technologies like <a href="http://code.google.com/apis/accounts/docs/OpenID.html">OpenID</a> have achieved across the web. As more websites seek to interact with one another to provide a richer experience for users, we're seeing even more interest in finding a secure way to enable that kind of information sharing while avoiding the hassle for users of creating new accounts and passwords.<br /><br />Excitement for technology like OpenID is not limited to the private sector. President Obama's open government memorandum last year spurred the <a href="http://openid.net/2009/09/09/yahoo-paypal-google-equifax-aol-verisign-acxiom-citi-privo-wave-systems-pilot-open-identity-for-open-government-2/">creation of a pilot initiative</a> in September to enable U.S. citizens to more easily sign in to government-run websites. Google joined a number of other companies to explore ways to answer that call.<br /><br />Now, several months later, some interesting things are taking shape. The <a href="http://openidentityexchange.org/">Open Identity Exchange (OIX)</a>, a new organization and certification body focused on online identity management, <a href="http://openidentityexchange.org/press-releases/oix-launch-2010-03-03">today named</a> Google among the first identity providers to be approved by the U.S. Government as meeting federal standards for identity assurance. This means that Google's identity, security, and privacy specifications have been certified so that a user can register and log in at U.S. government websites using their Google account login credentials. The National Institute of Health (NIH) is the first government website <a href="http://openidentityexchange.org/press-releases/nih-announces-oix-pilots-2010-03-03">ready to accept</a> such credentials, and we look forward to seeing other websites open up to certified identity providers so that users will have an easier and more secure time interacting with these resources.<br /><br />Our hope is that the work of the OIX and other groups will continue to grow and help facilitate more open government participation, as well as improve security on the Internet by reducing password use across websites.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-6784208132626044420?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/federal-support-for-federated-login/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting Users and Ads from Malware</title>
		<link>https://googledata.org/google-online-security/protecting-users-and-ads-from-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-users-and-ads-from-malware</link>
		<comments>https://googledata.org/google-online-security/protecting-users-and-ads-from-malware/#comments</comments>
		<pubDate>Fri, 16 Oct 2009 21:05:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Eric Davis, Head of Anti-MalvertisingAs part of Cyber Security Awareness Month, we're highlighting cyber security tips and features to help ensure you're taking the necessary steps to protect your computer, website, and personal information. ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Eric Davis, Head of Anti-Malvertising</span><br /><br />As part of Cyber Security Awareness Month, we're highlighting cyber security tips and features to help ensure you're taking the necessary steps to protect your computer, website, and personal information. For general cyber security tips, check out <a href="http://googleblog.blogspot.com/search/label/security">our online security educational series</a> or visit <a href="http://www.staysafeonline.org/">http://www.staysafeonline.org/</a>.<br /><br />At Google, we always aim to provide users with useful, relevant information. Readers of this blog know that we also work hard to detect malicious content on the web and protect users from harm. But did you know that we strive for the same level of relevance, and work equally as hard to protect users, in our online advertising business?<br /><br />The mainstream media has recently picked up on the topic of malvertising (malware-infected advertising). Google's Anti-Malvertising Team works hard in this area and would like to take this time to share some important safety tips. We work closely with the Anti-Malware Team to identify trends and improve automated detection systems. We also educate users, develop policies and act as a liaison between the online security and online advertising communities.<br /><br />Whether you're a web publisher who accepts ads on your website, or a home user who enjoys browsing the wide variety of advertising-supported content available on the web, we expect the resources below will help protect you from malvertising.<br /><br /><span style="font-weight: bold;">What is "Malvertising?"</span><br />"Malvertising" = malware + advertising. Haven't heard of it? The terminology may be new, but we can all understand the concept. Although malware distributors have attempted to spread malware through online ads for years, ever-improving prevention and detection methods have made it unlikely for most Internet users to have encountered a "bad ad" firsthand. However, it's important to make sure that you (and your computer) are properly prepared in case you encounter any source of malware on the web — whether it is an infected ad, a hacked site, a dangerous link, or someone who is pretending to be someone they're not.<br /><br /><span style="font-weight: bold;">Anti-Malvertising.com</span><br />We created Anti-Malvertising.com earlier this year as a resource for all members of the online ecosystem. Anti-Malvertising.com contains tips designed for <a href="http://www.anti-malvertising.com/tips-for-publishers">publishers</a>, <a href="http://www.anti-malvertising.com/tips-for-ad-operations">ad operations teams</a>, and <a href="http://www.anti-malvertising.com/tips-for-everyone">Internet users</a> to help protect their websites, networks, and computers.<br /><br /><span style="font-weight: bold;">Tips for Web Publishers: Know Who You're Working With, Perform Comprehensive QA, &amp; Have a Plan in Place</span><br />Anti-Malvertising.com includes a <a href="http://www.anti-malvertising.com/engine">custom search engine</a> to help individual ad networks, publishers, and ad operations teams conduct quick background checks on prospective advertisers. It indexes a variety of independent, third party sites that track possible attempts to distribute malware through advertising. It is intended to be used as one of the steps in a publisher's background check process.<br /><br />In some recent cases, infected ads that had already been caught and publicized by security researchers have remained active within some advertising systems. Anti-Malvertising.com's <a href="http://www.anti-malvertising.com/engine">malvertising research engine</a> makes it easier for the online advertising and security communities to share information and collaborate to help protect users from emerging threats.<br /><br />For more detailed guidance on the following tips, visit <a href="http://www.anti-malvertising.com/tips-for-publishers">http://www.anti-malvertising.com/tips-for-publishers</a><br /><ul><li>    Pay close attention to all agencies and advertisers with whom you work.</li><li>Perform due diligence by thoroughly checking prospective partners' references and credentials.</li><li>Perform comprehensive QA on all ad creatives.</li><li>Protect your own computer and website from infection.</li><li>Be aware that various ad networks and exchanges may have significantly different standards for the prevention and detection of malware. No automatic detection system, however robust, can substitute for your own vigilance. However, we strongly advise against exposing your site to harm by using networks or exchanges without strong anti-malware security measures in place. </li><li>Ensure your Ad Operations team has an incident response plan in place (for guidance, visit <a href="http://www.anti-malvertising.com/tips-for-ad-operations">http://www.anti-malvertising.com/tips-for-ad-operations</a>).<br /></li></ul><span style="font-weight: bold;">Tips for Users: Protect Your Computer, Update Regularly, and Avoid Getting Tricked</span><br /><ul><li>Make sure your browser, operating system, software and plugins are all updated regularly (enable auto-updates when possible).</li><li>Be aware that malware can be disguised as antivirus/antispyware software in order to trick people into buying or downloading it. Fake (and harmful) software of this kind is known in the web security community as "rogue security software." How to avoid getting tricked? Always research a company's reputation before downloading its software or visiting its website, and be wary of unexpected warnings from products you haven't installed yourself. You can view a list of some legitimate free security scans at <a href="http://www.staysafeonline.org/content/free-security-check-ups">http://www.staysafeonline.org/content/free-security-check-ups</a>.</li><li>Exercise caution whenever you're prompted to download an email attachment, follow an instant message link, install a plug-in, or download an unfamiliar piece of software.<br /></li></ul><span style="font-weight: bold;">Protecting the Free Availability of Online Content</span><br />In addition to providing visibility to advertisers, revenue to publishers, and information to users, the online advertising business model also enables anyone with an Internet connection to access an entire world of content for free. By increasing our vigilance as a community, we can help to keep online ads safe and preserve the wide access to information that advertising enables.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-3654041554502848083?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/protecting-users-and-ads-from-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Password strength and account recovery options</title>
		<link>https://googledata.org/google-online-security/password-strength-and-account-recovery-options/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=password-strength-and-account-recovery-options</link>
		<comments>https://googledata.org/google-online-security/password-strength-and-account-recovery-options/#comments</comments>
		<pubDate>Wed, 15 Jul 2009 18:54:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Macduff Hughes, Engineering DirectorThere's been some discussion today about the security of online accounts, so we wanted to share our perspective. These are topics that we take very seriously because we know how important they are to our us...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Macduff Hughes, Engineering Director</span><br /><br />There's been some discussion today about the security of online accounts, so we wanted to share our perspective. These are topics that we take very seriously because we know how important they are to our users. We run our own business on Google Apps, and we're highly invested in providing a high level of security in our products. While we can't discuss individual user or customer cases, we thought we'd try to clear up any confusion by taking some time to explain how account recovery works with various types of Google accounts and by revisiting some tips on how users can help keep their account data secure.<br /><br />One of the more common requests for assistance that we receive from regular Gmail users is to help them regain access to their accounts after they have misplaced or forgotten their password. We know that it can be frustrating when you can't access your account, and we've worked hard to come up with a system designed to help our users regain access to their accounts as smoothly as possible while taking appropriate precautions to protect their account security. When you select a password as you create an account, we recommend that you also choose a security question and provide a secondary email address. Recently, we also added a field where you can <a href="http://www.google.com/support/accounts/bin/answer.py?answer=152124" id="gzue" title="input a mobile phone number to assist with later account recovery">input a mobile phone number to assist with later account recovery</a>. We regularly provide tips about how you can <a href="http://mail.google.com/support/bin/answer.py?answer=29409" id="k.t3" title="choose good passwords and security questions">choose good passwords and security questions</a>, and we also share our best ideas for <a href="http://googleblog.blogspot.com/2008/09/what-to-do-if-you-cant-access-your.html" id="aj67" title="what to do when you can't access your account">what to do when you can't access your account</a>. It's important to keep your password, security question, and secondary email address up to date. It's not enough to just tell us your email address to try to change your password. The security question helps us identify you, but if you want to initiate a password reset, we'll only send that information to the secondary address or the mobile phone number you provide. <br /><br />We handle password recovery differently for our Google Apps customers. There is no password recovery process for individual Google Apps users. Instead, users must communicate directly with their domain administrator to initiate password changes on their individual accounts. Earlier this year we added new password security tools for Google Apps that allow administrators to <a href="http://googleenterprise.blogspot.com/2009/01/new-layer-of-data-access-security-for.html" id="rrzy" title="set password length requirements and view password strength indicators">set password length requirements and view password strength indicators</a> to identify sufficiently long passwords that may still not be strong enough. For businesses that desire additional authentication security, since 2006 we have supported SAML Single Sign On, a protocol that allows organizations to use two factor authentication solutions such as certificates, smartcards, biometrics, one time password devices, and other stronger tokens.<br /><br />If you're a regular Gmail user and you haven't updated your account information in a while, we recommend you do so by visiting your Google Account settings page now.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-697356497982978561?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/password-strength-and-account-recovery-options/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>HTTPS security for web applications</title>
		<link>https://googledata.org/google-online-security/https-security-for-web-applications/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=https-security-for-web-applications</link>
		<comments>https://googledata.org/google-online-security/https-security-for-web-applications/#comments</comments>
		<pubDate>Tue, 16 Jun 2009 20:06:00 +0000</pubDate>
		<dc:creator><![CDATA[Jay]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Alma Whitten, Software Engineer, Security &#38; Privacy TeamsA group of privacy and security experts sent a letter today urging Google to strengthen its leadership role in web application security, and we wanted to offer some of our thoughts ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author"  style="font-size:100%;">Posted by Alma Whitten, Software Engineer, Security &amp; Privacy Teams</span><span style="font-size:100%;"><br /><br />A group of privacy and security experts sent a <a href="http://www.wired.com/images_blogs/threatlevel/2009/06/google-letter-final2.pdf" id="qxp4" title="letter">letter</a> today urging Google to strengthen its leadership role in web application security, and we wanted to offer some of our thoughts on the subject. </span>   <div>     <span style="font-size:100%;"><br /></span>   </div>   <div>     <span style="font-size:100%;"><i><span style="font-style: normal;">We've long <a href="http://googleonlinesecurity.blogspot.com/2008/12/announcing-browser-security-handbook.html" id="wopc" title="advocated for">advocated for</a> — and <a href="http://gmailblog.blogspot.com/2008/07/making-security-easier.html" id="tl_v" title="demonstrated">demonstrated</a> — <span style="background-color: rgb(255, 255, 255);">a focus on</span> strong security in web applications. We run our own business on Google Apps, and we strive to provide a high level of security to our users. We currently let people access a number of our applications — including Gmail, Google Docs, and Google Calendar, among others — via <a href="http://en.wikipedia.org/wiki/Https" id="ja9m" title="HTTPS">HTTPS</a>, a protocol that establishes a secure connection between your browser and our servers.<br /><br />Let's take a closer look at how this works in the case of Gmail.  We know that tens of millions of Gmail users rely on it to manage their lives every day, and we have offered HTTPS access as an option in Gmail from the day we launched.</span></i>  If you <a href="http://mail.google.com/support/bin/answer.py?answer=74765&amp;cbid=-17ta0pv9qt0jq&amp;src=cb&amp;lev=answer" id="n.fi" title="choose to use">choose to use</a> HTTPS in Gmail, <span style="background-color: rgb(255, 255, 255);">our systems are designed to maintain it</span> throughout the email session — not just at login — so everything you do <span style="background-color: rgb(255, 255, 255);">can be passed through a more</span> secure connection. Last summer we made it even easier by letting Gmail users opt in to <a href="http://gmailblog.blogspot.com/2008/07/making-security-easier.html" id="z6:0" title="always use HTTPS">always use HTTPS</a> every time they log in (no need to type or bookmark the "https").   </span></div>   <div>     <span style="font-size:100%;"><br /></span>   </div>   <div><span style="font-size:100%;"> Free, always-on HTTPS is pretty unusual in the email business, particularly for a free email service, but we see it as an another way to make the web safer and more useful. It's something we'd like to see all major webmail services provide. </span></div>   <div>     <span style="font-size:100%;"><br /></span>   </div>   <div><span style="font-size:100%;">     In fact, we're currently looking into whether it would make sense to turn on HTTPS as the default for all Gmail users.   </span></div>   <div>     <span style="font-size:100%;"><br /></span>   </div>   <div>     <span style="font-size:100%;">We know HTTPS is a good experience for many </span><span style="font-size:100%;">power users who've already turned it on as their default setting. And in this case, the additional cost of offering HTTPS isn't holding us back. But we want to more completely understand the impact on people's experience, analyze the data, and make sure there are no negative effects. Ideally we'd like this to be on by default for all connections, and we're investigating the trade-offs, since there are some downsides to HTTPS — in some cases it makes certain actions slower.</span>   </div>   <div>   </div>   <div>     <span style="font-size:100%;"><br /></span>   </div>   <div><span style="font-size:100%;"> We're planning a trial in which we'll move small samples of different types of Gmail users to HTTPS to see what their experience is, and whether it affects the performance of their email. Does it load fast enough? Is it responsive enough? Are there particular regions, or networks, or computer setups that do particularly poorly on HTTPS?  </span></div>   <div>     <span style="font-size:100%;"><br /></span>   </div>   <div><span style="font-size:100%;"> Unless there are negative effects on the user experience or it's otherwise impractical, we intend to turn on HTTPS by default more broadly, hopefully for all Gmail users.<span style="background-color: rgb(255, 255, 255);"> We're also considering how to make this work best for other apps including Google Docs and Google Calendar (we offer free HTTPS for those apps as well).  </span></span>   </div>   <div>     <span style="font-size:100%;"><br /></span>   </div>   <div><span style="font-size:100%;"> Stay tuned, but we wanted to share our thinking on this, and to let you know we're always looking at ways to make the web more secure and more useful.<br /><br /><span style="font-weight: bold;">Update @ 1:00pm</span>:  We've had some more time to go through the report.  There's a factual inaccuracy we wanted to point out:  a cookie from Docs or Calendar doesn't give access to a Gmail session.  The master authentication cookie is always sent over HTTPS — whether or not the user specified HTTPS-only for their Gmail account.  But we can all agree on the benefits of HTTPS, and we're glad that the report recognizes our leadership role in this area.  As the report itself points out, "Users of Microsoft Hotmail, Yahoo Mail, Facebook and MySpace are also vulnerable to [data theft and account hijacking]. Worst of all — these firms do not offer their customers any form of protection.  Google at least offers its tech savvy customers a strong degree of protection from snooping attacks."  We take security very seriously, and we're proud of our record of providing security for free web apps.<br /><br /><span style="font-weight: bold;">Update on June 26th</span>: We've sent a response to the signatories of the letter. You can read it <a href="http://www.google.com/googleblogs/pdfs/google_httpsresponse.pdf">here</a>.<br /></span></div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-2466994922245745170?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/https-security-for-web-applications/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
