• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechGoogle

U.S. House Lifts Block on Google-Hosted Apps

By
Reuters
Reuters
By
Reuters
Reuters
May 18, 2016, 6:36 PM ET
Photograph by LEON NEAL AFP/Getty Images

The U.S. House of Representatives’ information technology team this week reinstated access on its internet network to software applications hosted on a Google cloud service after the company addressed potential security fears, according to an email seen by Reuters.

Yahoo Mail remains inaccessible, however, and has been blacklisted since the House Information Security Office said in an April 30 memo it had detected an increase of ransomware attacks on the network.

The two restrictions were not related, but came within days of each other and made some communication among lawmakers and their staff more difficult, several congressional aides said.

Get Data Sheet, Coins2Day’s technology newsletter.

Devices connected to the House’s internet via Wi-Fi or ethernet cables were barred from accessing appspot.com, the domain where Alphabet’s Google (GOOG) hosts custom-built apps, on May 3 due to concerns about a potential security vulnerability identified publicly by the FBI in June 2015.

“Based on Google’s corrective actions of removing suspicious applications from appspot.com, InfoSec has unblocked access to appspot.com on the House Network,” an email sent by the House’s technology service desk on Monday said.

It is unclear if that apparent appspot.com flaw caused any damage or presented any actual threat. The House Information Service Office did not respond to a request for comment.

Here’s the fallout of the OPM hack

In a statement, a Yahoo (YHOO) spokesperson said it had been working with the House’s technology staff to address their questions.

“Unfortunately, we have been disappointed that they have not moved as quickly on recommended changes that would better protect its employees” the spokesperson said.

Two individuals fell victim to ransomware by clicking on infected Word document email attachments, sources familiar with the hacking said. The infected files were able to be recovered without paying any ransom, sources told Reuters last week.

About the Author
By Reuters
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.