{"id":10940,"date":"2018-08-27T13:46:59","date_gmt":"2018-08-27T13:46:59","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29253\/Fortnites-Chief-Unhappy-About-Google-Security-Bug-Disclosure.html"},"modified":"2018-08-27T13:46:59","modified_gmt":"2018-08-27T13:46:59","slug":"fortnites-chief-unhappy-about-google-security-bug-disclosure","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/","title":{"rendered":"Fortnite&#8217;s Chief Unhappy About Google Security Bug Disclosure"},"content":{"rendered":"<figure class=\"media-landscape has-caption full-width lead\"><span class=\"image-and-copyright-container\"> <img loading=\"lazy\" decoding=\"async\" class=\"js-image-replace\" alt=\"Fortnite on Android\" src=\"https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/15B88\/production\/_103186988_59069a6c-33ce-4915-9893-367093568c53.jpg\" width=\"976\" height=\"549\"\/><span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Epic Games<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> Android devices have to use Epic&#8217;s own installer rather than the Google Play store to get the game <\/span> <\/figcaption><\/figure>\n<p class=\"story-body__introduction\">The leader of the firm behind the hit game Fortnite has accused Google of being &#8220;irresponsible&#8221; in the way it revealed a flaw affecting the Android version of the title. <\/p>\n<p>On Friday, <a href=\"https:\/\/issuetracker.google.com\/issues\/112630336\" class=\"story-body__link-external\">Google made public<\/a> that hackers could hijack the game&#8217;s installation software to load malware.<\/p>\n<p>The installer is needed because Epic Games has bypassed Google&#8217;s app store to avoid giving it a cut of sales.<\/p>\n<p>Epic&#8217;s chief executive said Google should have delayed sharing the news.<\/p>\n<p>&#8220;We asked Google to hold the disclosure until the update was more widely installed,&#8221; <a href=\"https:\/\/twitter.com\/TimSweeneyEpic\/status\/1033226094357504000\" class=\"story-body__link-external\">tweeted Tim Sweeney<\/a>.<\/p>\n<p>&#8220;They refused, creating an unnecessary risk for Android users in order to score cheap PR points.&#8221;<\/p>\n<figure class=\"media-landscape has-caption full-width\"><span class=\"image-and-copyright-container\"> <span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Epic Games<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> Epic Games released a &#8220;beta version&#8221; of Fortnite for Android earlier this month <\/span> <\/figcaption><\/figure>\n<p>A spokesman for Google declined to comment.<\/p>\n<p>Google has been criticised in the past <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-30779898\" class=\"story-body__link\">by Microsoft<\/a> for sharing details of vulnerabilities in the Windows-maker&#8217;s products before they had been addressed.<\/p>\n<p>The Android developer&#8217;s security team has also caught out <a href=\"https:\/\/www.zdnet.com\/article\/googles-project-zero-reveals-three-apple-os-x-zero-day-vulnerabilities\/\" class=\"story-body__link-external\">Apple<\/a> and <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-34719564\" class=\"story-body__link\">Samsung<\/a> in a similar manner.<\/p>\n<p>But in this case, one independent cyber-security expert said Epic was responsible for getting into this situation.<\/p>\n<p>&#8220;People will argue until the cows come home the a period is either too long or not long enough depending on which side you&#8217;re on,&#8221; <a href=\"https:\/\/twitter.com\/troyhunt\/status\/1033663296711188480\" class=\"story-body__link-external\">commented Troy Hunt<\/a>.<\/p>\n<p>&#8220;I&#8217;m still surprised Epic didn&#8217;t put it in the Play Store to begin with &#8211; and yes, I get the financial incentive.&#8221;<\/p>\n<p>Google&#8217;s terms dictate that Epic would have had to <a href=\"https:\/\/support.google.com\/googleplay\/android-developer\/answer\/112622?hl=en-GB\" class=\"story-body__link-external\">have handed over 30% of its in-game fees<\/a>. <\/p>\n<p>The developer has, however, agreed to such terms on Apple&#8217;s equivalent app store since iPhones are restricted from adding software from elsewhere.<\/p>\n<h2 class=\"story-body__crosshead\">Fast fix<\/h2>\n<p>According to Google&#8217;s documentation, <a href=\"https:\/\/issuetracker.google.com\/action\/issues\/112630336\/attachments\/17638291?download=true\" class=\"story-body__link-external\">its security team shared a screen recording<\/a> with Epic on 15 August demonstrating a way to fool the games&#8217; Android installer into loading malware.<\/p>\n<p>Epic responded two days later saying that it was distributing a fix after &#8220;working around the clock&#8221; to create it.<\/p>\n<figure class=\"media-landscape has-caption full-width\"><span class=\"image-and-copyright-container\"> <span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Google<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> Google released a video showing how a fake version of Fortnite might be installed <\/span> <\/figcaption><\/figure>\n<p>&#8220;We would like to request the full 90 days before disclosing this issue so our users have time to patch their devices,&#8221; the games company added.<\/p>\n<p>Google&#8217;s disclosure rules state that it reveals details of bugs to the public 90 days after reporting them to the developers responsible if they have not been tackled, but only waits one week after a patch is made &#8220;broadly available&#8221;.<\/p>\n<p>As such, it rejected the request.<\/p>\n<p>Mr Sweeney has said he is grateful that Google audited his firm&#8217;s software and notified it of the flaw. <\/p>\n<p>But he denied suggestions that the tech giant had acted in users&#8217; interests by refusing to keep the matter private until mid-November.<\/p>\n<div class=\"social-embed\">\n<div class=\"social-embed-post social-embed-twitter\">\n<div class=\"embed embed-twitter\" readability=\"5.1139896373057\">\n<div class=\"embed-region\" role=\"region\" aria-label=\"Twitter post by @TimSweeneyEpic\" readability=\"5.9663212435233\"> <a class=\"off-screen jump-link\" href=\"#jump-linkhttps:\/\/twitter.com\/TimSweeneyEpic\/status\/1033736012009271297\">Skip Twitter post by @TimSweeneyEpic<\/a> <\/p>\n<div class=\"twitter-wrap\" readability=\"6.991935483871\">\n<blockquote class=\"twitter-tweet\" data-conversation=\"none\" data-lang=\"en\" readability=\"7.6039603960396\">\n<p lang=\"en\" dir=\"ltr\">There\u2019s a technical detail here that\u2019s important. The Fortnite installer only updates when you run it or run the game. So if a user only runs it every N days, then the update won\u2019t be installed for N days. We felt N=90 would be much safer than N=7.<\/p>\n<p>\u2014 Tim Sweeney (@TimSweeneyEpic) <a href=\"https:\/\/twitter.com\/TimSweeneyEpic\/status\/1033736012009271297?ref_src=twsrc%5Etfw\">August 26, 2018<\/a><\/p><\/blockquote><\/div>\n<p class=\"off-screen\" id=\"jump-linkhttps:\/\/twitter.com\/TimSweeneyEpic\/status\/1033736012009271297\" tabindex=\"-1\">End of Twitter post by @TimSweeneyEpic<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<\/div>\n<p>&#8220;Epic Games&#8217; decision to bypass the Google app store shows that when security conflicts with commercial interests, often the commercial interests win but at the cost of the public&#8217;s safety online,&#8221; commented Professor Steven Murdoch, a security researcher at University College London.<\/p>\n<p>&#8220;Security is no longer just the result of people making good technical decisions, but also that the complex commercial structures in place work for, and not against, better online security.&#8221;<\/p>\n<figure class=\"media-landscape has-caption full-width\"><span class=\"image-and-copyright-container\"> <span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Epic Games<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> Users who protect their accounts will be given access to one of Fortnite&#8217;s dances <\/span> <\/figcaption><\/figure>\n<p>In a separate development, Epic <a href=\"https:\/\/www.epicgames.com\/fortnite\/en-US\/news\/2fa\" class=\"story-body__link-external\">has announced an incentive<\/a> for all Fortnite players to activate two-factor authentication to reduce the risk of their accounts being stolen.<\/p>\n<p>This requires gamers to enter a code sent to their phone or email address in addition to their password when signing in.<\/p>\n<p>Those that adopt the practice can use the game&#8217;s Boogiedown dance moves. <\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29253\/Fortnites-Chief-Unhappy-About-Google-Security-Bug-Disclosure.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":10941,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[2975],"class_list":["post-10940","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinephoneflawgoogle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fortnite&#039;s Chief Unhappy About Google Security Bug Disclosure 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fortnite&#039;s Chief Unhappy About Google Security Bug Disclosure 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-27T13:46:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/fortnites-chief-unhappy-about-google-security-bug-disclosure.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"320\" \/>\n\t<meta property=\"og:image:height\" content=\"180\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fortnite&#8217;s Chief Unhappy About Google Security Bug Disclosure\",\"datePublished\":\"2018-08-27T13:46:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/\"},\"wordCount\":730,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure.jpg\",\"keywords\":[\"headline,phone,flaw,google\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/\",\"name\":\"Fortnite's Chief Unhappy About Google Security Bug Disclosure 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure.jpg\",\"datePublished\":\"2018-08-27T13:46:59+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure.jpg\",\"width\":320,\"height\":180},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fortnites-chief-unhappy-about-google-security-bug-disclosure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,phone,flaw,google\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinephoneflawgoogle\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fortnite&#8217;s Chief Unhappy About Google Security Bug Disclosure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fortnite's Chief Unhappy About Google Security Bug Disclosure 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/","og_locale":"en_US","og_type":"article","og_title":"Fortnite's Chief Unhappy About Google Security Bug Disclosure 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-27T13:46:59+00:00","og_image":[{"width":320,"height":180,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/fortnites-chief-unhappy-about-google-security-bug-disclosure.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fortnite&#8217;s Chief Unhappy About Google Security Bug Disclosure","datePublished":"2018-08-27T13:46:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/"},"wordCount":730,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/fortnites-chief-unhappy-about-google-security-bug-disclosure.jpg","keywords":["headline,phone,flaw,google"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/","url":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/","name":"Fortnite's Chief Unhappy About Google Security Bug Disclosure 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/fortnites-chief-unhappy-about-google-security-bug-disclosure.jpg","datePublished":"2018-08-27T13:46:59+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/fortnites-chief-unhappy-about-google-security-bug-disclosure.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/fortnites-chief-unhappy-about-google-security-bug-disclosure.jpg","width":320,"height":180},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fortnites-chief-unhappy-about-google-security-bug-disclosure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,phone,flaw,google","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinephoneflawgoogle\/"},{"@type":"ListItem","position":3,"name":"Fortnite&#8217;s Chief Unhappy About Google Security Bug Disclosure"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=10940"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10940\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/10941"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=10940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=10940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=10940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}