|
Google has agreed to a preliminary $135 million settlement in a class action lawsuit brought by Android users who accused it of harvesting their data without consent. The suit alleged that since November 12, 2017, Google has been illegally collecting cellular data from phones purchased through carriers, even when apps were closed or location features were disabled.
As reported by Reuters, the affected users believed Google using their data for marketing and product development meant it was guilty of "conversion." In US law, conversion occurs when one party takes the property of another with "the intent to deprive them of it" or "exert property rights over it."
Subject to approval from a judge, a settlement of $135 million was filed in a San Jose federal court earlier this week. The payout would be one of, if not the largest ever in a case of this nature, according to Glen Summers, a lawyer for the plaintiffs.
Each user involved in the lawsuit would be entitled to up to $100 from Google, which denies any wrongdoing and has agreed to seek consent during the setup process of a new phone from now on. A toggle will be added to enable users to easily disable data transfer, while the Alphabet-owned company will also adjust its terms of service accordingly. A trial is scheduled for August 5.
This is the second settlement this week for Google. On January 26, the company also agreed to a $68 million settlement regarding claims that Google Assistant had bee
|
|
Lockdown Mode is an optional security feature designed by Apple to provide maximum protection against highly sophisticated digital threats. When enabled on your Apple device, it greatly reduces exposure to complex attacks by restricting certain features and network connections. Keep reading to learn how to use it across iPhone, iPad, and Mac.
|
|
Virtual private networks (VPNs) have been household technology for a while now, but there's still a lot of uncertainty around them. This is partly due to the fact that they can conceal online activity that local or national governments deem illegal — up to and including, say, circumventing ID checks for age verification. Consumers aren't helped by the sheer amount of duds sold in app stores right next to the best VPNs, especially when they're purposefully exploiting moments that have people rushing to shore up their online anonymity. If you've almost decided to start using a VPN, you may be wondering if the services you're looking at are actually safe.
Unfortunately, the answer is a hard "it depends." VPNs are technology that can work well or poorly, just like they can be used for good or evil. There's nothing intrinsically dangerous about using a VPN — whether or not one is safe comes down to who built it and how they're running it. The good news is that there are easy ways to tell whether you're using one of the good ones.
The question "Are VPNs really safe?" can also mean something else — "Is using a VPN enough to keep me safe online?" I'll get into that too, but to spoil the ending: VPNs are important security tools, but they aren't enough to protect against all digital threats by themselves. Also, to be clear, I'm talking here about commercial VPNs like Proton VPN and ExpressVPN, not commercial VPNs like NordLayer or Cisco AnyConnect
|
|
AI-powered browsing features have become a battleground among browser makers in recent months. OpenAI launched its Atlas browser in October, while Microsoft Edge and Opera have also introduced AI assistants and automated browsing capabilities. And now Google is upping the ante. The company has announced a slew of new AI features for Chrome, including a persistent sidebar for the Gemini chatbot and "auto browse" capabilities that can perform web tasks on your behalf.
|
|
The latest research shows that wearables could soon be a vital part of tracking your heart health.
|
|
Of all the potential nightmares about the dangerous effects of generative AI (genAI) tools like OpenAI's ChatGPT and Microsoft's Copilot, one is near the top of the list: their use by hackers to craft hard-to-detect malicious code. Even worse is the fear that genAI could help rogue states like Russia, Iran, and North Korea unleash unstoppable cyberattacks against the US and its allies.
The bad news: nation states have already begun using genAI to attack the US and its friends. The good news: so far, the attacks haven't been particularly dangerous or especially effective. Even better news: Microsoft and OpenAI are taking the threat seriously. They're being transparent about it, openly describing the attacks and sharing what can be done about them.
To read this article in full, please click here
|
|
AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.
"Even though they're deploying the same routers, switches, and firewalls, there's something fundamentally different about telco networks that shields them from many threats to enterprise LANs," Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.
To read this article in full, please click here
|
|