Targeted Advertisements (Get Used To Them)

Nobody likes to think that
their actions, interests and expressions on a fun, social network like Google+
might be somehow diverted into the database of some giant advertising firm and
used to push them products. But, when you get right down to it, that’s how
Google makes money. Rather than stick your head in the sand, get smart and
review Google’s five point list of Privacy Principles.

Nobody likes to think that
their actions, interests and expressions on a fun, social network like Google+
might be somehow diverted into the database of some giant advertising firm and
used to push them products. But, when you get right down to it, that’s how
Google makes money. Rather than stick your head in the sand, get smart and
review Google’s five point list of Privacy Principles. It begins with a promise (or admission, depending on how you look at it) that the company will “Use information to provide [their] users with valuable products and services.” You can take the charitable view: that they will use your information to better their own services, but don’t kid yourself that Google won’t give third parties access to that information as well.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.

Discussion

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.