by Michael Cropper | May 5, 2017 | Digital Pulse |
Posted by Mark Risher, Director, Counter Abuse Technology
As many email users know, phishing attacks—or emails that impersonate a trusted source to trick users into sharing information—are a pervasive problem. If you use Gmail, you can rest assured that every day, millions of phishing emails are blocked from ever reaching your inbox.
This week, we defended against an email phishing campaign that tricked some of our users into inadvertently granting access to their contact information, with the intent to spread more phishing emails. We took quick action to revoke all access granted to the attacker as
Source:: Protecting You Against Phishing
by Michael Cropper | May 5, 2017 | Digital Pulse |

I grew up as a first-generation American living on welfare and food stamps with a single mother in Hell’s Kitchen, New York. For most of my life, college seemed out of reach—no one in my family or neighborhood had gone, so it was hard to imagine that I’d ever get there. The day I committed to going to college was the day my life changed. It opened many doors and opportunities, and I made lifelong friends (and learned a few important lessons) along the way. Now I’ve dedicated my career at Google to helping educators use technology to
Source:: Why I celebrate College Signing Day
by Michael Cropper | May 5, 2017 | Digital Pulse |
The new version of OnlineSchemaChange is written in Python and has a more flexible architecture.
Source:: OnlineSchemaChange rebuilt in Python
by Michael Cropper | May 5, 2017 | Digital Pulse |
As many email users know, phishing attacks—or emails that impersonate a trusted source to trick users into sharing information—are a pervasive problem. If you use Gmail, you can rest assured that every day, millions of phishing emails are blocked from ever reaching your inbox.
This week, we defended against an email phishing campaign that tricked some of our users into inadvertently granting access to their contact information, with the intent to spread more phishing emails. We took quick action to revoke all access granted to the attacker as well as steps to reduce and prevent harm from future
Source:: Protecting you against phishing