Top Stories google
- Lifehacker Pack For Android 2015: The Essential Android Apps
- My Smartphone Doesn't Need To Be Revolutionary
- Google's New Smart Lock Is The Password Manager For The Rest Of Us
- How Oracle Versus Google Could Ruin Software Development
- The Five Best Google Mobile Apps For Your Small Business
- The Coolest Android M Features Google Didn't Announce
We’ve heard a lot about Stagefright, the collective name for the critical vulnerabilities which makes an estimated 950 million Android devices open to attacks was found earlier this year. Now two new security bugs have been discovered which affects even more Android devices. This is what we know about Stagefright 2.0.
iOS 9 has a ton of great little hidden features, and over on iDownloadBlog, they point out another one with “Paste and Search” and “Paste and Go,” two new clipboard options that make searching in Safari a little more pleasant.
Google has brought out a ‘block’ feature to its Gmail service which lets users relegate emails from specific people to junk mail hell. If only this was available back in my youth when those annoying “You’re going to die if you don’t forward this to 10 people” chain letter emails were doing the rounds.
Mac: You already make sure to back up your computer (right?) but what about your Google accounts? If something happened to it, you might not have time to get to Takeout to download your data before it’s too late. That’s where CloudPull comes in — it’s an automatic backup tool for your Google account.
Google Drive has everything you need to create the ultimate desktop office suite, but it has some other creative business uses as well. Using Google Drawings and Google Docs you can create great looking Gmail signatures to jazz up your emails.
Earlier this year, Google was warned about critical vulnerabilities, dubbed Stagefright, in Android’s media library by security firm Zimperium which opens an estimated 950 million Android devices to attacks. While Google is still scrambling to fix the flaws, Zimperium has now made the code to exploit the vulnerabilities available to the public.