Skip to main content

How To Know If A Third Party App Is Reading Your Gmail Inbox? How To Disable Gmail Access?

Last year, Google was criticised for accessing users’ inbox to show them relevant ads. In the time that followed, the search giant stopped its practices, but the ability for third-party apps to look into people’s Gmail inbox remained intact.
Recent reports have suggested that not just the computers and apps, even third-party developers are able to read people’s emails. And the practice doesn’t happen without the explicit consent of the users which doesn’t explicitly mention that the data accessed would be viewed by human eyes.
Google has also clarified that Gmail access to third party apps isn’t given without them being subjected to a thorough vetting process.
Anyway, there may or may not be some evil mind trying to access your Gmail. But taking an extra step towards your privacy and security is a must. You can find out what apps can look into your Gmail inbox.

How to check and disable apps from accessing your Gmail account?

Every setting associated to your Google account can be managed by visiting the My Account page. There you can find what third-party apps are connected to your Google account and what kind of data they’ve access to.
Follow the steps mentioned below:
  1. Sign-in to your Google account and go to the My Account page.
  2. Under Sign-in & security, click on Apps with account access.
    Disable Gmail Access Third Party Apps 1
  3. On the page, click on Manage Apps.
    Disable Gmail Access Third Party Apps 2
  4. Now, a list of all the apps (Google and non-Google) having access to your account is displayed. The level of permissions they’ve have is also shown.
  5. You can click on any app name to expand it and view what it can do with the permissions and when it was granted.
  6. Next, click on Remove Access to revoke all the permissions given to the particular app.
    Disable Gmail Access Third Party Apps 3
So, this way you can disable Gmail access for third-party apps. But you should also keep in mind that pulling the permissions may affect the normal operation of some apps that require Google services to work. For instance, if you’re using a Calendar app with your Google account, it should have read and write permission to edit your Google calendar.

“Has full access to your Google account” – What does it mean?

Out of the many apps connected to your account, some can only read basic information or access a couple of services. On the other hand, some have complete access to your Google account.
With full access, it can view and modify almost all of the information in your Google account. Still, there are few essential things it can’t do. For instance, it can’t change your password, delete your Google account, or make Google Pay transactions.
Mostly Google-made apps have full access to your account, but it could be given to third-party apps as well. However, if you don’t trust or recognize an app with full account access, you should remove access immediately.

Comments

Popular posts from this blog

[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks

Recently uncovered two huge processor vulnerabilities called Meltdown and Spectre have taken the whole world by storm, while vendors are rushing out to patch the vulnerabilities in its products. The issues apply to all modern processors and affect nearly all operating systems (Windows, Linux, Android, iOS, macOS, FreeBSD, and more), smartphones and other computing devices made in the past 20 years. What are Spectre and Meltdown? We have explained both, Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715), exploitation techniques in our previous article. In short, Spectre and Meltdown are the names of security vulnerabilities found in many processors from Intel, ARM and AMD that could allow attackers to steal your passwords, encryption keys and other private information. Both attacks abuse 'speculative execution' to access privileged memory—including those allocated for the kernel—from a low privileged user process like a malicious app running...

Unlocked phones vs. locked phones: Why you should care

Should you get an unlocked phone? The US wireless market is more competitive than ever, which is great news for consumers who have lots of choices when it comes choosing a service provider. But one barrier still exists when trying to switch carriers: the locked smartphone. The end of wireless contracts marked a watershed trend for consumers because it finally opened the door for them to more easily shop around for alternative wireless carriers. But the software locks that carriers put on phones restricting its use on other networks still prevent many consumers from having total freedom when it comes to choosing a provider. Now Verizon, the only wireless carrier that sold its phones unlocked out of the box, is reversing course. The company  said earlier this week  it would begin locking the phones it sells to consumers for an undetermined period of time, which will prevent them from using a SIM card from another carrier. But Verizon promised it would eventually ...

Watch Out! New Cryptocurrency-Mining Android Malware is Spreading Rapidly

Due to the recent surge in cryptocurrency prices, threat actors are increasingly targeting every platform, including IoT, Android, and Windows, with malware that leverages the CPU power of victims' devices to mine cryptocurrency. Just last month, Kaspersky researchers spotted fake antivirus and porn Android apps infected with malware that mines Monero cryptocurrency, launches DDoS attacks, and performs several other malicious tasks, causing the phone's battery to bulge out of its cover. Now, security researchers at Chinese IT security firm Qihoo 360 Netlab  discovered  a new piece of wormable Android malware, dubbed  ADB.Miner , that scans wide-range of IP addresses to find vulnerable devices and infect them to mine digital cryptocurrency. According to the researchers, ADB.Miner is the first Android worm to reuse the scanning code programmed in Mirai—the infamous IoT botnet malware that knocked major Internet companies offline last ...