The Unhackable Google!
Facebook, Twitter, and Microsoft (in no particular order) were recently attacked by hackers. This led to a number of questions being raised. How did they manage to get into the servers of such big corporations? Why did they want to do it? And most importantly: Is Google any safer than these websites? To find the answer, we must study the problem.
When any hacking attempt (successful or unsuccessful) happens, we get scared by hearing words like “accounts hacked” or “security compromised”. This makes us lose trust in the website. The recent spate of attacks has one common thread. Let’s find out what it is:
A quarter million accounts compromised in one go. Twitter was the first one to admit the hacking. It linked the hacking to a flaw in the Java program. The Homeland Security had already warned of such attacks.
Although the attacks happened a month before the Twitter attacks, Facebook acknowledged the breach only after Twitter admitted the attack. However, Facebook claimed that all user data was safe on its servers. But again, the breach was reported to have been due to a problem in Java.
Microsoft linked the attacks on its servers to the ones on Twitter and Facebook. That means a problem in Java was responsible for attacks on three of the world’s top establishments. Apart from these, Apple, Wall Street Journal, New York Times, and Washington Post were also targeted. The Homeland Security report points towards malicious software targeting individual computers.
Since Apple has been harmed even though Java is disabled in it, the disabling option seems not viable on other systems. Does that mean Google is vulnerable to hacking too? Can our beloved Chrome be a cause of worry for us? The answer lies in the methodology of the company.
The Chrome OS was built to be secure. A term “sandboxing” is pretty famous with those linked with Google. This feature disallows spreading of malicious links and malware. Many extensions are used in Chrome. Each extension can be a cause of hacking. However, here lies the interesting portion.
The principle of privilege separation is applied in Chrome. The extensions declare their intended privileges in the manifest. In case of a compromise, the attack is limited to the privilege assigned. This means a person hacking into your Gmail will not gain access into your bank account.
Achieving this requires extensions to be divided in to two pieces: background page & content scripts. While the background page is isolated from the web, the scripts can access it anytime. Both of these, however, are interlinked with each other.
So if you have a Google account or use any of its products, you do not need to worry much. Google has already done a lot to prevent hacking from outside sources. But, of course, it is our job to download material only from trusted links. Our alertness can prevent hackers from going deep into the website’s systems.
Like us on Facebook
This week Top Posts
- Top Things To Do After Installing Ubuntu 13.10 'Saucy Salamander' : Ubuntu 13.10 Saucy Salamander will be released on coming October 17th with many new salient featur...0 comments |
- Manage Databases And Hosted Servers Remotely With DbNinja : Database administration via command line is bit difficult for newbie system and database administrat...0 comments |
- Install Sayonara Player In Elementary OS / Ubuntu / Linux Mint : Sayonara is a small, clear and fast audio player for Linux written in C++, supported by the Qt frame...0 comments |
- How To Install Linux Kernel 3.12.4 In Ubuntu : Linux Kernel 3.12.4 has been officially released with fixes for inet6_init() cleanup order, seqlock ...0 comments |
- How To Upgrade From Ubuntu 13.04 Raring To Ubuntu 13.10 Saucy Salamander : Ubuntu 13.10 Saucy will be released on October 17th. Hope it will come with lot of improvements and ...0 comments |
- Firefox 26 Has Been Released, How To Install It In Ubuntu And Its Derivates : Hi guys, Firefox 26 has been released for Windows, Mac OS X, Linux and Android devices. It brings m...0 comments |
- How To Install Linux Kernel 3.12.4 In Ubuntu
- Firefox 26 Has Been Released, How To Install It In Ubuntu And Its Derivates
- How To Install Brasero In Elementary OS ‘Luna’
- Install Sayonara Player In Elementary OS / Ubuntu / Linux Mint
- Manage Databases And Hosted Servers Remotely With DbNinja
- Install FrostWire 5.6.9 In Elementary OS ‘Luna’/ Ubuntu / Linux Mint
- Setup IT And Asset Management System With GLPI On Debian/Ubuntu
- How To Configure Linux Clients To Authenticate Using OpenLDAP
- How To Install Netflix In Ubuntu
- cowsay And fortune Combined Together
This work by unixmen.com is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
Copyright © 2008-2013 Unixmen.com .