Rub3X writes: "To execute the attack, the victim needs to be logged in to a Google service, and visit a specially crafted page. The page in question is on a Google sub domain, so it does look legitimate. A proof of concept page was set up to verify the claims, and successfully tested on a user of the Google services in question. With this attack you can: Get in to Google Docs and Spreadsheets application and read and modify documents saved there, Read subjects from GMail, including part of the first sentence, Access the personalized homepage, View Google Accounts page, Enter Google Reader, Read your private Google Notebook, View my complete Google search history if search history feature is enabled."
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's now on IFTTT. Check it out! Check out the new SourceForge HTML5 Internet speed test! ×