[Infowarrior] - Book: Googling Security

Richard Forno rforno at infowarrior.org
Fri Dec 5 14:01:07 UTC 2008


Googling Security: How Much Does Google Know About You? (Paperback)
by Greg Conti (Author)

http://www.amazon.com/exec/obidos/ASIN/0321518667/downandoutint-20

About the Author

Greg Conti is an assistant professor of computer science at the U.S.  
Military Academy in West Point, New York. His research includes  
security data visualization, usable security, information warfare, and  
web-based information disclosure. He is the author of Security Data  
Visualization (No Starch Press, 2007) and has been featured in IEEE  
Security & Privacy magazine, Communications of the ACM, and IEEE  
Computer Graphics and Applications magazine. He has spoken at a wide  
range of academic and hacker conferences, including Black Hat, DEFCON,  
and the Workshop on Visualization for Computer Security (VizSEC).  
Conti runs the open source security visualization project RUMINT. His  
work can be found at www.gregconti.com/ and www.rumint.org/.

< - >

When you use Google’s “free” services, you pay, big time–with personal  
information about yourself. Google is making a fortune on what it  
knows about you…and you may be shocked by just how much Google does  
know. Googling Security is the first book to reveal how Google’s vast  
information stockpiles could be used against you or your business–and  
what you can do to protect yourself.

Unlike other books on Google hacking, this book covers information you  
disclose when using all of Google’s top applications, not just what  
savvy users can retrieve via Google’s search results. West Point  
computer science professor Greg Conti reveals the privacy implications  
of Gmail, Google Maps, Google Talk, Google Groups, Google Alerts,  
Google’s new mobile applications, and more. Drawing on his own  
advanced security research, Conti shows how Google’s databases can be  
used by others with bad intent, even if Google succeeds in its pledge  
of “don’t be evil.”



Chapter 1: Googling 1

Chapter 2: Information Flows and Leakage 31

Chapter 3: Footprints, Fingerprints, and Connections 59

Chapter 4: Search 97

Chapter 5: Communications 139

Chapter 6: Mapping, Directions, and Imagery 177

Chapter 7: Advertising and Embedded Content 205

Chapter 8: Googlebot 239

Chapter 9: Countermeasures 259

Chapter 10: Conclusions and a Look to the Future 299




More information about the Infowarrior mailing list