Domestika, tornano i saldi: sconti fino al 75%
Sono tornati i saldi Domestika, con tantissimi corsi in offerta fino al 75% di sconto: tra i più gettonati social e programmi di grafica.
Domestika, tanti corsi in offerta fino al 75% di sconto
Sabrent SSD in offerta su Amazon: Rocket NVMe PCIe M.2 2280 da 1 TB
In offerta su Amazon l’SSD Interno da 1TB: stiamo parlando del Rocket NVMe PCIe M.2 2280 di Sabrent
Leggi Sabrent SSD in offerta su Amazon: Rocket NVMe PCIe M.2 2280 da 1 TB
Google Nest Wifi: prezzo ridicolo, è scontato del 56% su Amazon
Cavo ottico TOSLINK super lungo (10Mt): con 13€ elimini ogni distanza
Apple AirPods Pro: le cuffie che stavi cercando, oggi in offerta su Amazon
Huawei FreeBuds Pro con adattatore: suono SPAZIALE a prezzo low cost (99€)
L’Action Cam subacquea del momento in Ultra HD 4K comprala ora a soli 34€
L’Action Cam che stavi aspettando OGGI può essere tua con appena 34€ su Amazon. Ma fai in fretta, numero limitato.
Leggi L’Action Cam subacquea del momento in Ultra HD 4K comprala ora a soli 34€
How Google Assistant helped me spend more time outside
Summer is my favorite season, and whenever it comes around, I always try to soak up as much sunshine as I can. But with my schedule, it can be tough to carve out quality outdoor time. So as we hit the end of summer in the U.S., I set a challenge for myself — to get outside every day during the week. And as a member of the Google Assistant team, I knew Assistant could help give me that extra nudge out the door. Here’s how it went.
Monday
After a full day of meetings at the office, I needed to clear my head. Instead of just heading home like I normally would, I asked my Assistant, “Hey Google, what parks are nearby?” It showed a handful of options near me. I ended up heading to Murphey Candler Park, one of my favorites in Atlanta, for a long walk to help me recharge my batteries.

Murphey Candler Park in Atlanta was one of the nearby park options Assistant shared with me.
Tuesday
I typically work out on Tuesdays, so in the spirit of my outdoor challenge, I decided to go for a swim. To help keep me accountable and on schedule, I told my Assistant, “Hey Google, remind me to go for a swim at 5 p.m.” When I got that 5 p.m. nudge, I packed up for the day and headed to the pool at my apartment complex.

I took my Tuesday workout to the pool, thanks to a helpful reminder from my Assistant.
Wednesday
During a walk around my neighborhood, I started thinking about my weekend plans. The weather forecast showed that Saturday was going to be particularly beautiful, so I texted my friends to see if they’d be up for a picnic. After we agreed on a place and time, I said to my Assistant “Hey Google, add ‘picnic with friends’ to my calendar for Saturday at 4 p.m.” to make sure it was blocked on my schedule.
Thursday
One of the things I love most about working at Google is celebrating work anniversaries, or what we call “Googleversaries.” My friend Akilah hit her third Googleversary on Thursday, so we headed to the pool after work to celebrate. For an extra treat (and to cool off), we decided to get some ice cream — but we didn’t want to lose our poolside spot. This was the perfect opportunity to try out our new Assistant feature with Uber Eats. With a quick, “Hey Google, order ice cream on Uber Eats,” Assistant opened my Uber Eats app to show us nearby delivery options and let us customize our order. Soon enough, our ice cream was on its way.

Enjoying our ice cream order from Uber Eats.
Friday
I wanted to start my weekend on the right foot, and my friend Jessica immediately came to mind. She’s an avid hiker and is always looking for someone to explore new trails with. So as I was packing up at the office, I told my Assistant “Hey Google, text Jessica, ‘Let’s go hiking.’” We did a three-mile, scenic hike on the East Palisades Trail — a great way to wrap up the week and my outdoor challenge.
Assistant can help you easily send a text, especially when you have your hands full.
These Google Assistant features made it easy to stick to my goal of getting outside every day, and they’re continuing to help me soak up the rest of the summer. I hope they do the same for you!
SAMSUNG Galaxy Chromebook Go LTE, il prezzo precipita al minimo storico su Amazon
Il SAMSUNG Galaxy Chromebook Go LTE crolla di prezzo su Amazon fino a costare 165,14€ in meno rispetto al prezzo di listino.
Leggi SAMSUNG Galaxy Chromebook Go LTE, il prezzo precipita al minimo storico su Amazon
VIABUY: conto online con IBAN e carta prepagata
Thunderbird 102 si aggiorna e corregge una montagna di bug
Mozilla ha appena rilasciato un aggiornamento per Thunderbird 102 con un gran numero di fix: l’installazione è fortemente consigliata.
Leggi Thunderbird 102 si aggiorna e corregge una montagna di bug
Standard militare MIL-STD NATO, lo smartwatch del momento costa appena 35€
Chiavetta USB 128GB per iPhone, Android e PC: da prendere AL VOLO su Amazon
Meet the team responsible for hacking Google
Creating safe and secure products for everyone is the top priority for Google’s security teams. We work across the globe to keep up with current threats, improve security controls, conduct attack detection/prevention, and eliminate entire classes of vulnerabilities by driving new and better frameworks. Our teams also actively monitor adversaries, making sure we have all the intelligence to be prepared for malicious activity and targeted campaigns against our Googlers or the people who use our services daily.
Today, we would like to shine a spotlight on one security team at Google — the Red Team — that supports all of these efforts in a way that might initially seem counterintuitive: by hacking Google.
The term “Red Team” came from the military, and described activities where a designated team would play an adversarial role (the “Red Team”) against the “home” team, who would seek to adapt to the Red Team’s activities and counteract them. Over the years, these terms have found their way into the information security (InfoSec) space.
Google’s Red Team is a team of hackers that simulate a variety of adversaries, ranging from nation states and well-known Advanced Persistent Threat (APT) groups to hacktivists, individual criminals or even malicious insiders. Whatever actor is simulated, we will mimic their strategies, motives, goals, and even their tools of choice — placing ourselves inside the minds of hackers targeting Google.
The benefits of Red Team exercises
Running these simulations provides value in various ways. To start, it offers our teams tasked with detecting and responding to actual attackers a unique opportunity to identify improvements. And it allows us to determine if an attack could have been detected earlier or responded to faster. Along with security and subject matter experts on rotation, the collective industry experience and diverse backgrounds of the Red Team’s members allow us to identify blind spots that can turn into actionable improvements.
From 20% project to established team
The Red Team started in 2010 as a “20% project” — an internal initiative where Googlers are free to pursue projects we feel are worth investing time in outside of our day-to-day responsibilities. The team quickly proved its worth, and leadership recognized its positive impact on Google’s infrastructure and the value in applying a hacker mindset to problems in the security space. Since then, the Red Team has become an integral part of the security engineering function, running multiple exercises in parallel and collaborating across multiple continents.
Collaborative adversity
While Red Team exercises conducted at Google simulate an actor that is in most cases hostile and/or disruptive, there is a very clear distinction between the simulated threat and the engineers that play their role. While the threat actor seeks to reach their nefarious goals, Red Team engineers are Googlers that keep people’s safety in mind.
There is very close collaboration between the team simulating the attackers and the teams acting as defenders (e.g., Threat Analysis Group (TAG) and Detection/Response teams), who might identify suspicious activities and respond to them. Since there are multiple exercises happening at any given time, we differentiate between several types of exercises and the response after detection. For most exercises, one of our primary goals is to test detection and make it as efficient as possible for defenders to verify that a signal is associated with an exercise. By doing this, we avoid using resources that could be used to thwart malicious activities targeting people using our services or our wider infrastructure. In other exercises, we want to make sure that the entire process of identifying, isolating and ejecting the attackers, works as intended and that we are able to improve processes.
Safety First
Given the sensitive nature of the work the Red Team does, safety protocols are key and all exercises are overseen by senior engineers. Making sure an exercise is conducted in a safe and responsible manner is as important as any other goal the team is trying to achieve. This may mean forgoing realistic simulation in favor of spending more time on making sure each action is documented, no sensitive data is accessed without proper oversight, and that laws and regulations are obeyed — which is traditionally not something that APT groups are overly concerned about. For the Red Team, accurately simulating the technical capabilities of highly advanced threat actors in a safe and responsible way is core to their mission.
For exercises focusing on detection, actions taken by the team are accessible at any time by the defenders to ensure that we can quickly rule out an external actor acting maliciously. Even if this does not become a necessity, the team will report their activities in detail to address any new findings discovered during the exercise.
Fostering change
In addition to testing and helping improve detection and response capabilities, we also actively research and identify new attack vectors based on adversarial research. It is critical to the Red Team’s mission to ensure that any newfound attack surface is shared with both the responsible product teams and the larger security team as soon as possible so that Google can adapt defensive controls and implement improvements to remediate the root cause.
Since its inception over a decade ago, the Red Team has adapted to a constantly evolving threat landscape and been a reliable sparring partner for defense teams across Google. Yet, new challenges await every day and the Red Team continually works to make the job – the job of hacking Google – harder. It’s a challenge we happily accept to keep people safe.
