Sooner or later, this way or another, you are going to be ad-stabbed-back by all those shiny, friendly and colorful service providers. This has already happened with Google, and the history repeats itself with Mozilla. We have to admit, we are a little bit heartbroken. All great ideas have greedy endings.
Mozilla is about to introduce the thing called Suggested Tiles. So, what is the big deal about it? Well, this is a new kind of advertisement. You are going to search, and Mozilla is going to suggest. If you do not like it, you do not have to use it. As simple as that. When you put it this way, it sounds like a fair deal.
However, there is a catch. Mozilla’s suggestions are actually based on your browsing history. Now, it does not sound so fair, does it? We do not care about the things you advertise. Nevertheless, we have a right to ask, how did you create your offer? Based on what data?
Somehow, we have a feeling that this particular corporate greed is going to hit back Mozilla like a boomerang. Mozilla’s power is directly derived, or even better to say, borrowed from us, the users. No users. No trade. You have to maintain a careful balance. Otherwise, we will have to migrate to some other ad-free place.
First Google, and now Facebook has some tough times in Europe. Why? What you can do to the USers, you obviously cannot even think of repeating to the EUsers. The Belgian authorities are protecting their citizens, who have been followed without their knowledge nor approval.
On the other side, Facebook claims that its HQ in Ireland entitles it to a special position in relation to the EU regulations. Seriously? What is that supposed to mean? The last time we checked, Ireland was still an island much closer to Europe than the North American continent. Right?
Outside the US homefield there are not too many rain-me-money markets for the IT giants. We are talking about Europe and China. The catch is that if you want to make money there, you have to play by the rules, whether you like them or not. As simple and as complicated as that.
So, what is going to be the most probable outcome of this cyber-quarrel? Well, you do not have to be a rocket scientist, nor an EU-law-guru, to figure that one yourself, do you? Facebook is going to cry, but eventually it will have to comply. Europe is a too important market to play stubborn games.
This post’s picture says it all, doesn’t it? Here is the current situation in Russia, when it comes to the mobile OS options. Android takes up to 66%, while on the other side, iOS is somewhere between 21% and 23% of the entire Russian mobile market. What is that telling us?
Well, almost 90% of the Russian mobile paradise is in the evil American hands. That is the greatest Russian nightmare. So, what they are going to do about it? They will create a mobile OS on their own. It turns out that the open source platform called the Sailfish is going to be perfect for this purpose.
The Russians are pretty much ambitious about this one. By the end of 2025 more than 50% of the mobile OS market is supposed to be in Russian hands. Again. The users all over Russia are supposed to feel safe and protected in terms of their privacy. Right? Yet, why stop there?
There is more than one serious rumor that both Russia and China can launch their own Internet networks completely independent from the World Wide Web. If they want to. At any given moment. Yet, do we really need that? Each country should have its Net and mobile OS. Seriously?
It is not a secret nor a surprise that for quite some time the busy little bees in the IT industry have been looking for a way to use our own body as a legitimate cyber tool. This is how, we have ended up with an unprecedented and overwhelming body implants invasion. Yet, that was not enough.
We have witnessed first-hand in both Hollywood and laboratories how the scientists are trying to find a new machine package for our brain and mind. The same result again. That is also not enough. Now, Ericsson plans to go even further with its groundbreaking Print Connected concept.
To make the long story short, Ericsson wants to use our bodies as the legitimate cyber tools. In other words, our body will serve as a conductor and connector at the same time. By touching the devices around us, we will be able to surf the Internet and communicate.
All of these sound lovely. Just as if it has been borrowed from some SF movie. On the other side, now it is the right moment to raise some eyebrows and ask questions about endangered privacy. We have every reason to believe that a little bit later is going to be too late.
Here is a simple experiment, which can make you consider your privacy more seriously. It comes without saying that you have already tried to type your own name in Google search engines more than once. How about Google Maps? How about that for a change? You will be surprised.
However, there is a catch about the way you do it. Do not type your full name. You should try with an email, or a username associated with your social network account. Oh boy, you are going to be blown away, when you see how much is there in Google Maps about you and your movement.
Now, you see how crucial the location can be for your privacy. Do you have to disclose it so easily each time you use some service or install a new app. On the other side, it would be wrong to think that you should hide away from Google Maps and its associated location services.
However, you should invest at least a couple of additional invaluable seconds before making a final decision about sharing your location with a service or an app. You are not a secret agent nor on the FBI most wanted list, but you can think twice about your reckless behavior.
Every now and then, you stumble across something, which can be best described as the cyber-security-for-dummies. In some cases, the advice you can hear is unreliable and even a ridiculous one. However, the video we had a chance to see on YouTube was a little bit disturbing for our taste.
If you want to check it out yourself, all you have to do is type: “How to reveal a hidden password in the logging page”, or something similar. It really looks convincing, and this is something that worries us the most. So, how does it work? Here it is, if you are too lazy to look for a video.
You should use the right click on your mouse and choose inspect element option in the empty password field. Then, in the developer’s menu, you should replace “password” with “text”. According to what we have seen, this is supposed to work. We will try it ourselves, that is for sure.
What are the possible solutions for this surprising bug, if we could describe it as such? The very first thought that crosses our minds is to make sure your computer does not end up in the wrong hands. On the other side, should we cancel the inspect element option from our browsers?
To tell you the truth, we are not quite sure if this is one more of those crazy urban legends or a lost page from Edward Snowden’s diary. However, for what is worth, at some point in time the NSA planed or still plans to get its cyber hands on Google Play. What for? What is there to gain for them, in the first place?
Well, you do not have to be a rocket scientist nor a notorious NSA man in black to know for sure, do you? Instead of paying the countless malicious visits to mobile devices all over the world, it is a much smarter thing to get yourself a nice seat in Google Play and wait for the potential victims. Right?
Google is more or less surprisingly silent on this one. On the other side, it would be ridiculous to think that a users’ exodus is going to take place, if this information proves itself to be true, after all. We are all aware that our cyber privacy is nothing more than a huge and powerful illusion, aren’t we?
In addition, why bother with an expensive, complex and above all a compromising Google Play invasion? We have every reason to believe that for quite some time Google has been giving everything and anything the NSA asked for on a silver plate. We sure hope that Google Play is not a foul play.
Oh dear, you have been so naive. For some childish reason, you thought that the modern day viruses are not going to develop and evolve. You really need to be one hell of a brainiac to come up with a successful malicious software solution. The call of the dark-cyber-side can be a huge temptation.
Meet the latest, brightest and deadliest member of the growing malicious family called – Rombertik. This fellow has a remarkable AI potential. Some even dare to classify it as a self-aware malware. So, what does it do? What is so special and dangerous about it? Are you ready for some bad news?
Well, while at “work” this malware is in a “regular” mode for any malicious software. It steals away your financial data, while doing its best to keep a low profile. On the other side, as soon as you run an antivirus software, Rombertik strikes back in an unprecedented way.
This malware would rather destroy itself including your precious device. Now, you get it. This is a genuine and a deadly Kamikaze virus. Unfortunately, there is no much you can do about it. If lucky enough, you can reinstall your computer. Otherwise, Rombertik will make you buy a new one.
Every now and then, we simply have to include some of the dark cloud reports, which come from the Kaspersky Lab mountains. You know how it goes, don’t you? There is no good news with the busy little bees from the Kaspersky Lab. So, let us see what wrong has happened in 2015 first quarter for us to worry about.
The number of cyber threats and attacks have simply doubled in comparison to the identical period of the previous year. We are talking only about malware and viruses registered by the Kaspersky products and solutions. Unfortunately, that is only the beginning of bad news.
There is a new bad guy in our cyber-town and it is called the Equation Group. These guys are dead serious about their malicious work. They can infect your device’s firmware. How? That is something, Kaspersky would like to know, as well. What is the moral of this depressive story?
Well, for Kaspersky and other cyber security service providers the business is as usual. They will have plenty of work to do in the future. On the other side, we do not have a choice, than to become a little bit more religious. Pray that an Equation Group’s malware does not find you in the cyberspace.
We are definitely exaggerating with our egde-this-and-that metaphors, aren’t we? Yet, we just cannot help ourselves. Microsoft’s new Internet Explorer called the Spartan Project, and now officially the Edge is such an easy target for word games. However, grandpa Microsoft is not in the game mood.
Why? It wants to prove so many things to all of us with the new Windows 10. The MS Edge is one of them. We all know what is going to be the very first target of the merciless criticism in this field, don’t we? What about the security features of the new MS Edge? How strong it really is?
Well, grandpa Microsoft offers us a bug bounty challenge. If you want to earn $11,000, then all you have to do is to find a security flaw in the Edge. Do we have to warn you that it is not going to be an easy task? Microsoft has done its really best for the Edge to shine like a true cyber-star.
This way or another, sooner or later, some busy little bee will take this sweet honey prize. The questions is, though, how many times will grandpa Microsoft have to pay for this bug bounty? Either way, it is better to pay now than later, in the aftermath of a serious cyber attack. The clock is ticking. Your money is waiting.