Google Maps Privacy Traps

image

Here is a simple experiment, which can make you consider your privacy more seriously. It comes without saying that you have already tried to type your own name in Google search engines more than once. How about Google Maps? How about that for a change? You will be surprised.

However, there is a catch about the way you do it. Do not type your full name. You should try with an email, or a username associated with your social network account. Oh boy, you are going to be blown away, when you see how much is there in Google Maps about you and your movement.

Now, you see how crucial the location can be for your privacy. Do you have to disclose it so easily each time you use some service or install a new app. On the other side, it would be wrong to think that you should hide away from Google Maps and its associated location services.

However, you should invest at least a couple of additional invaluable seconds before making a final decision about sharing your location with a service or an app. You are not a secret agent nor on the FBI most wanted list, but you can think twice about your reckless behavior.

Walking On The Edge Of Security

image

We know it already. We know it all too well. Grandpa Microsoft throws all it has at shiny and new Windows 10. There is a paradise at the end of the Windows 10 rainbow, waiting for all of us. You can even play Candy Crush Saga once you get there. However, grandpa Microsoft is an extremely experienced cyber-road warrior.

It knows that all of our expectations and demands can come and go, easily, but one is to stay and play. The cyber security will patiently wait for its audience turn. Perhaps, this is the very reason grandpa Microsoft had promised us that the new Internet Explorer (aka Edge (aka Spartan)), will solve all of our security troubles and doubts.

We should not walk on the edge of cyber security with the Edge itself. Never again. Should we buy it, both Microsoft’s claim and product itself? Should we try it? We sure hope that the busy little bees in Microsoft do not treat Windows 10 promotion as an election year.

Otherwise, Windows 10 can easily end up as an unsuccessful political experiment where the overwhelming disappointment of its users ruined the party. Therefore, MS Edge has to be a true work of art in terms of cyber security, or else… Grandpa Microsoft you know the consequences, don’t you?

Open Your Door Grandpa Microsoft

image

Why would grandpa Microsoft do such a thing? What kind of a door we are referring to? Well, we are eager to witness a moment when Windows will be treated as an open source code. Why? Well, this is supposed to improve its cyber security. Something is obviously wrong with this picture.

It is a bold and ear-catching claim to ask for an open source code Windows, but how grandpa Microsoft feels about it? If it is going to be free to access and alter, does it also mean that you can get it for free, as well? On the other hand, the strongest argument for an open source is improved security. How?

Allegedly, the new open source structure can help you to access Windows more easily in search for bugs and vulnerabilities. So, who is stopping you to do it right now? What about all previous successful bug bounty hunters? They did not ask for a permission, did they?

This is definitely a wrong turn for our troubled thoughts. Let grandpa Microsoft does its job the best it can. We do not need an open door, at all. If you want to improve Windows security and eliminate potential vulnerabilities, go on and earn some fair money. Grandpa Microsoft can be generous.

The Vawtrak Is On The Attack

image

The latest cyber monster, which is after your virtual money, has a name. The Vawtrak malware has begun with its global domination in Japan. So far, the serious estimates say that more than 100,000 computers have been infected. This malicious software follows your online banking transactions.

It has a simple goal. The Vawtrak transfers your money to the third party bank accounts. The users all over Asia have already lost more than hundreds of millions of dollars. Now, when we are fully aware about this financial danger, what can we do in order to eliminate it, for good?

You can rest assured that quite a few busy little bees in the cyber security sector work day and night on an efficient solution. As always, it is a merciless race against the time itself. The Vawtrak is moving from the West toward the East. How much time we have left before the real trouble?

As soon as it hits the cyber shores of Europe and the USA, we will be facing the completely new level of the cyber disaster. One important piece of the cyber puzzle is missing, though. No one told us, how all of those computers got infected in the first place. That is worth knowing. Is not that right?

The Certification Wars

image

Google has a new cyber enemy made in China. The CNNIC or the China Internet Network Information Center is at least to say furious about Google’s rejection to accept its web certificates. So, what is the big deal with these certificates? Does it really have to be this way for these “old cyber friends”?

Do we really need an additional chapter in the book of conflicts between Google and China? Well, it seems that there is no other choice. This can be a disturbing and annoying thing for the Chinese website owners. Why? Each time someone uses the Chrome to check out your website, there is a surprise.

As a matter of facts, this surprise is not a nice one. You get a warning that this particular website does not play by the Google web security certification rules. You do not have to be a rocket scientist to guess twice how is this tiny detail going to affect the number of total visits, do you?

Maybe, this is a Google way of paying back some old dues for all the inconveniences associated with the rigid, but extremely profitable Chinese market. Unfortunately, while these two giants are fighting, we, the mortals, are going to suffer either way. What happened to a magical word called compromise?

EASA Easy

image

The European Aviation Safety Agency (EASA) has turned an important new page. From now on, your shiny gadgets can be used during the entire flight period with no rigorous limitations, we all know very well. So, what exactly youncan or cannot do with your devices, once you set a foot in an airplane?

Well, you can use a smartphone or tablet freely during a flight. This also includes all available 3G or 4G networks. On the other hand, you still cannot use the Internet on your laptop. This is something that will be strongly appreciated by all passengers. Yet, we have some security questions we need to ask.

Have you heard something about hacking the airplanes, recently? Not so long ago the flight agenda of the Japanese PM circulated for a while on the Internet. The airline company’s IT infrastructure was hacked. Now, do you dare to think what could have happened, if the airport or airplane itself was to be hacked instead?

With this most recent change of regulations, we will allow hackers to freely surf while in a plane. Maybe, this was not such a good idea. We sure hope this was not a result of some profit related idea. Like, we are having some bad times in the airline business, let us do something about it. We really hope that was not the case.