* 9 scary personal details Google collects about you

TechViews News   …..

Our readers know that we have been warning about Google’s personal data collection since we went live. Google is, without a doubt, the worst offender of privacy online. However, we all need to wade through Google’s services from time to time, so we tend to ignore that simple truth.

And a huge number of people still use – and like – Gmail either as their main service or a backup. And if you use an Android device, you must have a Gmail account, but that doesn’t mean you need to use it all the time.

A brief glance through our listing of previous articles will show multiple times we’ve tried to help cure people of their Google addiction. Unfortunately, Google’s business model is about spying on us and reselling our personal information to whomever will buy it. And folks … there are a LOT of companies and government agencies that want to know about us.

Continue reading

Advertisements

* How to clear out your browsing data from Android browsers

TechViews News   …..

Android mobile devices come with a basic, built in browser. While basic, the stock browser is really quite adept and fast in its use.

You may, if you choose, also install alternate browsers for use. The more popular ones are Firefox, Chrome, Dolphin & Opera (I use Dolphin).

Regardless which browser you use, our readers by now know that browsers collect and store information about your web activity, regardless to whether you are using a desktop or laptop computer, or a mobile device.

There are multiple reasons why deleting cookies, clearing the cache, and removing browsing history can benefit not only your privacy but also your devices and browsing sessions more generally.

Continue reading

* Easy way to clear the cache, cookies, and browsing data in Google Chrome

TechViews News   …..

Because of the way the Google Chrome browser is set up it can be difficult for users to get into the correct settings locations to clear out the cache, cookies, and browsing history.

And indeed, many users don’t care if a browser keeps track of their Internet activity and reports that activity back to someone, sitting at a desk, in a dark room, at some undisclosed location.

Yes, it just might be that scary. So here’s how to clear that tracking information from the Google Chrome browser:

Continue reading

*Four browsers with secure ad-blocking features built in.

TechViews News   …..

Having to wade through websites that are loaded with ad placements in every corner and between paragraphs can be a major nuisance. And these days many of the ads can be set to download malware onto your computer as well.

So a large number of people use ad-blockers to help eliminate that problem. Most work fairly well, even though a few ads may slip through. And some websites will even block you from viewing their content if you use an adblocker, requiring you to turn your ad-blocker off if you want to proceed.

Simply wanting to browse the Internet and not be pummeled with ads is getting more difficult all the time. Wouldn’t it be great if browsers actually used security methods to block ads?

There are actually quite a few browsers with these features built in, some lesser known than others. Here are four that we’ve tried that seem to do the job fairly well. These browsers will by no means block everything, but they are a great addition to add to your arsenal of ad-blocking and security programs.

Continue reading

*How browsing history collection works

TechViews News   …..

The media has been buzzing since the House of Representatives voted Tuesday to give Internet service providers (ISPs) the ability to compete on the same level as other Internet giants such as Google, Microsoft, Facebook, and others.

Those giants already collect and sell your browsing history for advertising purposes, this modification allows ISPs to essentially compete in the same manner as the non-regulated afore mentioned Internet giants.

How will it work?

If the bill passes (remember, it’s not yet law, ISPs will have the ability to collect, store, share and sell certain types of data — including browsing history, app usage data, location information, all without users’ consent. This is already being done on a massive, invasive scale by Google, Facebook, Microsoft, and others.

While the collection is not mandated, nor is it always necessary to provide connection services, they have the option to retain connection information when you go online.

Continue reading

*Google Chrome users now vulnerable to tricky new technique

TechViews News   …..

There is a new malware attack involving bait-and-switch websites that affects Google Chrome users.

This is how the malware scam works:

  1. You must be using the Chrome Browser on a Windows computer.
  2. You must live in an English speaking country. As of now it’s just the U.S., U.K., Canada and Australia that are being targeted.
  3. You are sent to the malicious bait-and-switch website through a search engine (Google, Bing, etc.).

If all of these factors are in place, you could fall victim to this attack.

Hackers are inserting JavaScript into unsecure websites. If you’re using the Chrome browser and click the link from a search engine result, the Java Script makes the website unreadable. You will see random symbols that look like gibberish that will make it totally unreadable.

Continue reading

*Firefox and Tor to Patch Critical Zero-day Vulnerability

TechViews.org   …..

The critical Firefox vulnerability being actively exploited in the wild to unmask Tor users has been patched with the release of new browser updates. Both Mozilla and Tor Project has patched the vulnerability that allows attackers to remotely execute malicious code on Windows operating system via memory corruption vulnerability in Firefox web browser.

Tor Browser Bundle is a repackaged version of the open-source Mozilla Firefox browser that runs connections through the Tor anonymizing network configured to hide its user’s public IP address.

However, the exploit code released by an unnamed online user was currently being exploited against Tor Browser users to leak the potentially identifying information of Tor users.  Continue reading