<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>google Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/google/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/google/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Thu, 09 Nov 2017 14:08:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Warning! Google phishing &#8211; don&#8217;t click that google docs link</title>
		<link>https://itblogsec.com/warning-google-phishing-dont-click-that-google-docs-link/</link>
					<comments>https://itblogsec.com/warning-google-phishing-dont-click-that-google-docs-link/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 04 May 2017 07:30:19 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[google hacking]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=844</guid>

					<description><![CDATA[<p>There are chances that you might’ve received an email with a Google document. It could be a phishing attempt that has gone viral. This attack has affected about 1 million Gmail users. While Google has blocked the attack, make sure to take security check and look for suspicious app permissions.</p>
<p>The post <a href="https://itblogsec.com/warning-google-phishing-dont-click-that-google-docs-link/">Warning! Google phishing &#8211; don&#8217;t click that google docs link</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Warning! Google phishing &#8211; don&#8217;t click that google docs link</h2>
<p style="text-align: justify;">There are chances that <strong>you might’ve received an email</strong> with a <strong>Google</strong> <strong>document</strong>. It could be a <strong>google</strong> <strong>phishing</strong> attempt that has gone viral. This attack has <strong>affected about 1 million Gmail users</strong>. While Google has <strong>blocked the attack</strong>, make sure to take security check and look for suspicious app permissions.</p>
<p style="text-align: justify;">The notorious cyber criminals keep employing <strong>new techniques</strong> to make sure that they <strong>target new users</strong>. In a similar attempt, a new <strong>Google Docs phishing scam</strong> has spread like a wildfire <strong>all across the internet</strong>. If you’ve received an email from <strong>someone in your contact</strong> list with a <strong>Google document</strong>, don’t open it or click the link in it.</p>
<p style="text-align: justify;">Some of these emails are addressed to <strong>hhhhhhhhhhhhhhhh@<span class="skimlinks-unlinked">mailinator.com</span></strong> with the intended target placed in the <strong>BCC field</strong>. Here’s how this attack takes place:</p>
<ul style="text-align: justify;">
<li>If you click the link, <strong>it’ll take you to a Google accounts page</strong> with different Google accounts.</li>
<li>It asks you to <strong>choose an account and give permissions</strong> to an app called “Google Docs.” Here, <strong>Google Docs is a fake third party app</strong>.</li>
<li>After you given it the permissions, the f<strong>ake app has the permission to read your emails</strong> and forward a <strong>similar phishing email to all your contacts</strong>.</li>
</ul>
<p style="text-align: justify;"><em>Here’s how this attack looks like:</em></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Just got this as well. Super sophisticated. <a href="https://t.co/l6c1ljSFIX">pic.twitter.com/l6c1ljSFIX</a></p>
<p>&mdash; zach latta (@zachlatta) <a href="https://twitter.com/zachlatta/status/859843151757955072?ref_src=twsrc%5Etfw">May 3, 2017</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p style="text-align: justify;">Google has now <strong>disabled the accounts</strong> where the hack originated. The company has p<strong>ushed updates through Safe Browsing</strong>, and the concerned team is working to prevent such spoofing in future. In a second statement, Google made clear that the <strong>attack affected fewer than 0.1% Gmail users</strong>, which is about 1 million users. The company has now <strong>blocked the campaign</strong>. If you click on the link now, you’ll see an error page.</p>
<p style="text-align: justify;"><span style="color: #ff0000;"><strong>| ALSO READ:</strong><b> </b></span><a href="https://itblogsec.com/amazing-hidden-features-of-google-search-you-probably-dont-know/" target="_blank" rel="noopener noreferrer">Amazing hidden features of Google Search you probably don’t know</a></p>
<h4 style="text-align: justify;">What to do if you’ve already clicked on the Google Doc link?</h4>
<p style="text-align: justify;">To make sure that you haven’t been hit by the phishing attack, c<strong>heck your Google account’s app permissions</strong> by visiting <a href="https://myaccount.google.com/permissions" rel="nofollow">this link</a>. Make sure that <strong>there isn’t any app named Google Docs</strong>; Docs has access to your account by default. <strong>If you see it there, remove it.</strong></p>
<p style="text-align: justify;">Did you find this article on Google Docs phishing helpful? Share your views and feedback.</p>
<p style="text-align: justify;"><span style="font-size: 10pt;"><strong>source:</strong> <a href="https://fossbytes.com" target="_blank" rel="noopener noreferrer">https://fossbytes.com</a></span></p>
<p>The post <a href="https://itblogsec.com/warning-google-phishing-dont-click-that-google-docs-link/">Warning! Google phishing &#8211; don&#8217;t click that google docs link</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/warning-google-phishing-dont-click-that-google-docs-link/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google Analytics Regular Expressions Cheat Sheet</title>
		<link>https://itblogsec.com/google-analytics-regular-expressions-cheat-sheet/</link>
					<comments>https://itblogsec.com/google-analytics-regular-expressions-cheat-sheet/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 29 Mar 2017 10:43:55 +0000</pubDate>
				<category><![CDATA[Cheat Sheets]]></category>
		<category><![CDATA[google]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=810</guid>

					<description><![CDATA[<p>Analytics supports regular expressions so you can create more flexible definitions for things like view filters, goals, segments, audiences, content groups, and channel groupings. In the context of Analytics, regular expressions are specific sequences of characters that broadly or narrowly match patterns in your Analytics data.</p>
<p>The post <a href="https://itblogsec.com/google-analytics-regular-expressions-cheat-sheet/">Google Analytics Regular Expressions Cheat Sheet</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Google Analytics Regular Expressions Cheat Sheet</h2>
<p style="text-align: justify;">Analytics supports<strong> regular expressions</strong> so you can create more flexible definitions for things like <a href="https://support.google.com/analytics/answer/1033162" target="_blank" rel="noopener">view filters</a>, <a href="https://support.google.com/analytics/answer/1012040" target="_blank" rel="noopener">goals</a>, <a href="https://support.google.com/analytics/answer/3123951" target="_blank" rel="noopener">segments</a>, <a href="https://support.google.com/analytics/answer/2611268" target="_blank" rel="noopener">audiences</a>, <a href="https://support.google.com/analytics/answer/2853423" target="_blank" rel="noopener">content groups</a>, and <a href="https://support.google.com/analytics/answer/6010097" target="_blank" rel="noopener">channel groupings</a>. In the context of Analytics, regular expressions are <strong>specific sequences of characters</strong> that broadly or narrowly <strong>match patterns in your Analytics data</strong>.</p>
<p style="text-align: justify;">For example, if you wanted to create a view filter to exclude site data generated by your own employees, you could <strong>use a regular expression to exclude any data from the entire range of IP addresses</strong> that serve your employees. Let’s say those IP addresses range from 198.51.100.1 &#8211; 198.51.100.25. Rather than enter 25 different IP addresses, you could create a regular expression like 198\.51\.100\.\d* that matches the entire range of addresses.</p>
<p style="text-align: justify;">Or if you wanted to create a view filter that <strong>included only campaign data from two different cities</strong>, you could create a regular expression like San Francisco|New York (San Francisco or New York).</p>
<p style="text-align: justify;">Check <strong>cheat sheet created by Jay Taylor</strong>, listing the most used regular expressions supported by Google Analytics.</p>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/03/jay-taylor_google-analytics-regular-expressions.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="bottom" data-toolbar-fixed="off">jay-taylor_google-analytics-regular-expressions</a></p>
<p style="text-align: center;">Download file <a href="https://itblogsec.com/wp-content/uploads/2017/03/jay-taylor_google-analytics-regular-expressions.pdf" target="_blank" rel="noopener">here</a></p>
<p style="text-align: center;"><span style="font-size: 8pt;"><strong>source:</strong> <a href="https://www.cheatography.com" target="_blank" rel="noopener">https://www.cheatography.com</a>, <a href="https://support.google.com/analytics" target="_blank" rel="noopener">https://support.google.com/analytics</a></span></p>
<p>The post <a href="https://itblogsec.com/google-analytics-regular-expressions-cheat-sheet/">Google Analytics Regular Expressions Cheat Sheet</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/google-analytics-regular-expressions-cheat-sheet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/153 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-16 21:50:17 by W3 Total Cache
-->