The latest iteration of the popular social network is known for its transparency, and one of its most well-known features is the “man in the middle” attack.
This means that a user can’t just send a tweet, send a friend request, or share a status update that would make their identity known.
Instead, a user needs to use a fake email address to impersonate an employee or a recruiter.
Google employees, in turn, can only see what you sent, and the fake account you used could easily be compromised by the malicious software.
The tool was developed to combat this type of attack.
The researchers used the tool to create a tool called “Hacker’s Boot,” which they say allows them to take control of an employee’s computer and access all of their email, chat, and Google Drive accounts.
The team also showed how they could install a malicious spyware on the computer, and then used the same spyware to hack into a user’s Google+ account, where they found a copy of their LinkedIn profile and a copy the user had sent to a recruitor.
Google, in a statement to Recode, said: We’ve taken steps to make it easier for you to report security incidents and keep your personal information safe.
“The Hacker’s Boot feature has been discontinued, but we’ve removed all of our tools from the Chrome Developer Tools, and we’re working with Google to restore it.”
Google’s statement also included a statement from LinkedIn, which said it is working with the FBI to find and prosecute hackers responsible for the attack.