{"id":15350,"date":"2019-05-18T10:45:14","date_gmt":"2019-05-18T18:45:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/05\/18\/news-9099\/"},"modified":"2019-05-18T10:45:14","modified_gmt":"2019-05-18T18:45:14","slug":"news-9099","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/05\/18\/news-9099\/","title":{"rendered":"Google Tracks What You Buy Online With Gmail"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cdf487738916b72fda0c4a8\/master\/pass\/Orders-499278430.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 18 May 2019 13:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">The week started <\/span>out with a bang, or several of them really. Remember Meltdown and Spectre, the vulnerabilities that affected basically every Intel processor from the last decade? There\u2019s a related <a href=\"https:\/\/www.wired.com\/story\/intel-mds-attack-speculative-execution-buffer\/\">attack called ZombieLoad<\/a>\u2014yes, ZombieLoad\u2014with similarly broad and bad impact. Serious stuff! But honestly not even the worst disclosure of the week.<\/p>\n<p>That <a href=\"https:\/\/www.wired.com\/story\/cisco-router-bug-secure-boot-trust-anchor\/\">distinction probably goes to Cisco<\/a>. Researchers at security firm Red Balloon found that they could hack the company\u2019s ubiquitous enterprise router, meaning they could listen in on whatever traffic goes to and from those networks. Cisco then acknowledged that dozens of its products were susceptible to the attack, likely comprising millions of devices, and that a fix would require an on-site visit.<\/p>\n<p class=\"paywall\">And that\u2019s before you even get to the week\u2019s big actual hack: Israeli hacking company NSO Group apparently found a way to break into phones simply by <a href=\"https:\/\/www.wired.com\/story\/whatsapp-hack-phone-call-voip-buffer-overflow\/\">placing a phone call through WhatsApp<\/a>. The recipient didn\u2019t even have to pick up. There\u2019s also Microsoft, which <a href=\"https:\/\/www.wired.com\/story\/microsoft-windows-xp-patch-very-bad-sign\/\">released its first Windows XP patch<\/a> since the months before the WannaCry ransomware strain swept to globe\u2014and <a href=\"https:\/\/www.wired.com\/2017\/05\/still-use-windows-xp-prepare-worst\/\">we all know how that turned out<\/a>.<\/p>\n<p class=\"paywall\">I can\u2019t stress enough that all of these things had happened by Tuesday.<\/p>\n<p class=\"paywall\">Things calmed down a bit from there. The <a href=\"https:\/\/www.wired.com\/story\/fcc-plan-stop-robocalls-awfully-familiar\/\">FCC rolled out a new robocall-stopping plan<\/a>, which is pretty much the same as the old robocall-stopping plan. <a href=\"https:\/\/www.wired.com\/story\/google-titan-security-key-recall-ble\/\">Google recalled its multi-factor authentication Titan Security Key<\/a> over a Bluetooth flaw. The feds and Europol took down a <a href=\"https:\/\/www.wired.com\/story\/goznym-takedown-cybercrime-supply-chain\/\">sophisticated international cybercrime ring<\/a>. And we took a look at how technology aided the National Security Council\u2019s ascendency in wartime matters.<\/p>\n<p class=\"paywall\">And there\u2019s more! Each week we round up the news that we didn\u2019t break or cover in depth but that you should know about. As always, click on the headlines to read the full stories. And stay safe out there.<\/p>\n<p class=\"paywall\">Google has been on a big ol\u2019 privacy PR push lately, including a fancy <a href=\"https:\/\/www.nytimes.com\/2019\/05\/07\/opinion\/google-sundar-pichai-privacy.html\" target=\"_blank\"><em>New York Times<\/em> op-ed from CEO Sundar Pichai<\/a> extolling the importance of protecting your data. Which is a great sentiment that doesn\u2019t quite jibe with the revelation this week that Google also raids your Gmail account for signs of transactions, and collects them all on a separate webpage for your account. You can find yours <a href=\"https:\/\/myaccount.google.com\/purchases\" target=\"_blank\">here<\/a>. It includes Amazon purchases, subscriptions, tickets, really anything for which you got an emailed receipt. Google says it doesn\u2019t use the information to serve ads, and that the page exists \u201cto help you easily view and keep track of your purchases, bookings and subscriptions in one place.\u201d Honestly, it\u2019s no surprise that Google\u2019s machines can read your email. But it\u2019s hard to understand on what planet the company thought maintaining a hidden away page that catalogs your retail activity there would read as anything but creepy and invasive. There\u2019s no easy way to delete that history, other than deleting receipts from your email or ticking through them one at a time on your Purchase page. To get at least a little control back over how Google tracks you, head to this <a href=\"https:\/\/www.google.com\/preferences\" target=\"_blank\">preferences page<\/a> and click \u201cDo not use private results.\u201d Because naturally, Google chose to make the use of private results the default, instead of opt-in.<\/p>\n<p class=\"paywall\">As trade tensions between the US and China remain unresolved, president Donald Trump this week struck a blow to a favorite target: Huawei, the Chinese tech company that the US has accused of posing a national security threat. In an executive order Wednesday, Trump banned transactions that pose \u201can unacceptable risk;\u201d the Commerce Department followed by placing Huawei on its so-called Entity List, which severely limits the extent to which US companies can do business with it.<\/p>\n<p class=\"paywall\">In a lengthy investigative report this week, ProPublica reports that multiple data recovery companies that promised to beat ransomware with the \u201clatest technology\u201d called Proven Data Recovery simply paid off the <a href=\"https:\/\/www.wired.com\/story\/atlanta-ransomware-samsam-will-strike-again\/\">hackers behind the SamSam ransomware<\/a> instead. Paying isn\u2019t the worst idea when you\u2019re in that situation, but to lying to customers and charging them fees on top of it kind of is.<\/p>\n<p class=\"paywall\">Adobe Flash is finally <a href=\"https:\/\/www.wired.com\/story\/adobe-finally-kills-flash-dead\/\">going to die off next year<\/a>, but it\u2019s not the only security-challenged product in the software company\u2019s stable. This week, Adobe released patches for dozens upon dozens of bugs, most of which relate to Adobe Acrobat and Reader. Don\u2019t worry, though; one still applied to Flash.<\/p>\n<p class=\"related-cne-video-component__dek\">Ransomware. It&#39;s malware but worse. It takes the contents of your device hostage and demands Bitcoin as a, you guessed it, ransom. Here&#39;s how to avoid it and what to do if your laptop gets locked.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/google-purchases-gmail-adobe-roundup\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cdf487738916b72fda0c4a8\/master\/pass\/Orders-499278430.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 18 May 2019 13:00:00 +0000<\/strong><\/p>\n<p>Adobe fixes, an executive order, and more of the week&#8217;s top security news.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-15350","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15350"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15350\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15350"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}