Skip to main content

Google Slammed For Giving Gmail Access To Third Party Developers (Humans)

There are many third-party apps that require access to your Gmail account. For instance, the ones that help you plan trips or shop online. The situation seems to be fine until one realizes other humans are also reading their emails.
According to a report from WSJ, third-party apps have access to users’ Gmail accounts and permission to read people’s emails but only after the consent of the users which nowadays isn’t important anymore.
The publication has named two apps among the list of many. Return Path – an app that collects data for marketers – read around 8,000 emails a couple of years ago. Another is Edison Software that is known to have allowed its employees to read thousands of emails to train their smart reply feature.
They defended themselves by saying their policies reflect their actions which are now a thing of the past and user consent was obtained before using the data. When accessing user data, the employees must stick to the rules.
Typically, a popup box is thrown in front of the users asking them for permissions to access different kinds of data and device components. However, it doesn’t explicitly mentions that humans would also be given to access it.
Google says it thoroughly checks third-party developers before giving them access to user data. This includes verifying that an app correctly identifies its developers and its privacy policies are clear and easily accessible.
Giving apps access to users inbox may not come as a surprise at all. In fact, it’s a “common practice” implemented by other email providers. But even the thought of humans reading emails sends a chill down the spine when combined with the fact that Gmail is the biggest of all.
The timing of this news makes it more unpleasant. Facebook is facing the consequences of the Cambridge Analytica scandal. The company allowed third-party developer access and ended up giving the information of 87 million users. In the case of Google, fortunately, no misuse of data has been reported until now.

Comments

Popular posts from this blog

[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks

Recently uncovered two huge processor vulnerabilities called Meltdown and Spectre have taken the whole world by storm, while vendors are rushing out to patch the vulnerabilities in its products. The issues apply to all modern processors and affect nearly all operating systems (Windows, Linux, Android, iOS, macOS, FreeBSD, and more), smartphones and other computing devices made in the past 20 years. What are Spectre and Meltdown? We have explained both, Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715), exploitation techniques in our previous article. In short, Spectre and Meltdown are the names of security vulnerabilities found in many processors from Intel, ARM and AMD that could allow attackers to steal your passwords, encryption keys and other private information. Both attacks abuse 'speculative execution' to access privileged memory—including those allocated for the kernel—from a low privileged user process like a malicious app running...

Unlocked phones vs. locked phones: Why you should care

Should you get an unlocked phone? The US wireless market is more competitive than ever, which is great news for consumers who have lots of choices when it comes choosing a service provider. But one barrier still exists when trying to switch carriers: the locked smartphone. The end of wireless contracts marked a watershed trend for consumers because it finally opened the door for them to more easily shop around for alternative wireless carriers. But the software locks that carriers put on phones restricting its use on other networks still prevent many consumers from having total freedom when it comes to choosing a provider. Now Verizon, the only wireless carrier that sold its phones unlocked out of the box, is reversing course. The company  said earlier this week  it would begin locking the phones it sells to consumers for an undetermined period of time, which will prevent them from using a SIM card from another carrier. But Verizon promised it would eventually ...

Watch Out! New Cryptocurrency-Mining Android Malware is Spreading Rapidly

Due to the recent surge in cryptocurrency prices, threat actors are increasingly targeting every platform, including IoT, Android, and Windows, with malware that leverages the CPU power of victims' devices to mine cryptocurrency. Just last month, Kaspersky researchers spotted fake antivirus and porn Android apps infected with malware that mines Monero cryptocurrency, launches DDoS attacks, and performs several other malicious tasks, causing the phone's battery to bulge out of its cover. Now, security researchers at Chinese IT security firm Qihoo 360 Netlab  discovered  a new piece of wormable Android malware, dubbed  ADB.Miner , that scans wide-range of IP addresses to find vulnerable devices and infect them to mine digital cryptocurrency. According to the researchers, ADB.Miner is the first Android worm to reuse the scanning code programmed in Mirai—the infamous IoT botnet malware that knocked major Internet companies offline last ...