logo
#

Latest news with #Gmail

Balancing privacy, safety and accountability
Balancing privacy, safety and accountability

The Star

time9 hours ago

  • Business
  • The Star

Balancing privacy, safety and accountability

AS of Jan 1, Malaysia recorded 25.1 million social media users, making it one of the most connected populations in the region. Most of these users voluntarily share personal data far beyond what is needed, for example, posting locations, preferences, routines and sometimes even sensitive information like their children's school details, vaccination records, or holiday plans. Ironically, while there is widespread concern over government or institutional data collection, little attention is paid to how private corporations such as Meta (Facebook), ByteDance (TikTok) and X (formerly Twitter) actively profile users for commercial gain. Facebook once claimed it would never sell user data, yet it infamously shared user data with Cambridge Analytica. This incident became a major scandal in global privacy discussions and involved not just basic data, but detailed personal information used for targeted political manipulation. If there is real concern about data being misused, then platforms that profit from mass data harvesting should be examined with equal, if not greater, intensity. One of the most overlooked realities in the digital age is this: there is no such thing as a free service. Every time a user signs up for a 'free' app or platform, be it social media, navigation tools, or online games, it is an exchange. Users grant access to their personal data, including their usage patterns, preferences, device details and even contacts, in return for these services. Most people accept the terms and conditions without reading them, unknowingly agreeing to large-scale data collection. Unlike the limited data gathered for national digital services for cybersecurity or to improve performance, tech giants build multi-billion-dollar empires on the back of detailed personal data profiles. This raises the question: why is there so much concern when a government programme or national platform transparently collects data for operational or protective purposes, while the daily exploitation by foreign platforms goes largely unchecked? Tech giants like Google and Apple have perfected the art of data collection. Gmail, Google Docs, Google Drive, Apple iCloud, Siri and Google Photos are all part of systems that continuously collect and analyse user data. This includes not just basic data, but actual content like search terms, voice commands, photos, browse history and even location. Apple may advertise itself as being focused on privacy, but even its basic data (such as who you called, when and for how long) is stored. Google, meanwhile, uses user behavior data for advertising, product development and AI training. Is the public truly informed about how much their data powers Google's AI models or Apple's products? More importantly, where is the outrage when these tech companies push updates that make it harder to opt out of data sharing? It is necessary to ensure fairness, ethical governance and consent in all forms of data collection, whether by governments or private companies. Nevertheless, we must avoid one-sided anger. A responsible national policy that uses shared data to detect cybersecurity threats or improve digital services should not be attacked while corporate data collection for profit is ignored. Not only that, data is also crucial in fighting online dangers. Protecting Malaysians in cyberspace is becoming more and more critical as online threats continue to grow. Shared user data plays a key role in the fight against cybercrime, helping to automatically detect scams, fraud and cyberbullying early on. With such incidents on the rise, using data responsibly is essential for public safety. Nevertheless, for such programmes to earn public confidence, the role of government oversight cannot be forgotten. It is vital that the MCMC and all relevant agencies do their part by performing careful checks. They must ensure that any data collected is stored and managed securely according to the highest international standards, making sure strong protections are in place to prevent data breaches. The public's trust depends on this strict oversight and accountability. Instead of debating endlessly, Malaysians should support the government's efforts to build a convenient and safer digital environment for all. Malaysians should answer the question of whether the need to protect the safety of Malaysians is more important than unproven claims of data privacy breaches. Prof Dr Selvakumar Manickam Universiti Sains Malaysia Cybersecurity Research Center director

Urgent Google warning for Gmail users as six new rules issued to keep emails safe
Urgent Google warning for Gmail users as six new rules issued to keep emails safe

Daily Record

time19 hours ago

  • Daily Record

Urgent Google warning for Gmail users as six new rules issued to keep emails safe

Google has issued a warning to Gmail users and they should be on high alert - here's how to stay safe Most email users are now well versed in recognising scams that bombard inboxes daily. Google has become so adept at identifying rogue messages that the majority are filtered out before they ever reach customers' accounts. However, it seems complacency is not an option at present. Hackers have recently executed a cyber attack that bypasses Google's multi-factor authentication. ‌ This means cyber criminals could gain complete access to accounts without the owner being aware of any issue. The new attack was detected by security researchers at Google Threat Intelligence Group, who confirmed targeted attacks have already occurred. ‌ Google accounts are typically very secure, with users required to use multiple methods to access services such as Gmail. These often include two-factor authentication, which sends a message to a second device before login is permitted, reports the Express. However, it appears Russian cyber criminals have discovered a way to target older phones and other devices that can't accommodate this additional verification step. Google provides something known as app passwords, which are unique 16-digit codes designed to protect less modern devices. However, because app passwords bypass the second verification step, hackers can steal or phish them more easily. According to Malwarebytes, the criminals used this method to target notable academics and critics of Russia. "The attackers initially made contact by posing as a State Department representative, inviting the target to a consultation in the setting of a private online conversation," explained Malwarebytes. ‌ "While the target believes they are creating and sharing an app password to access a State Department platform in a secure way, they are actually giving the attacker full access to their Google account." Despite this being a highly targeted attack, it doesn't mean the general public might not be next. ‌ "Now that this bypass is known, we can expect more social engineering attacks leveraging app-specific passwords in the future," warned Malwarebytes. If you're worried about this new attack, security experts at Malwarebytes have offered advice on how to stay safe. • Only use app passwords when absolutely necessary. If you have the opportunity to change to apps and devices that support more secure sign-in methods, make that switch. ‌ • The advice to enable MFA still stands strong, but not all MFA is created equal. Authenticator apps (like Google Authenticator) or hardware security keys (FIDO2/WebAuthn) are more resistant to attacks than SMS-based codes, let alone app passwords. • Regularly educate yourself and others about recognising phishing attempts. Attackers often bypass MFA by tricking users into revealing credentials or app passwords through phishing. ‌ • Monitor for unusual login attempts or suspicious behaviour, such as logins from unfamiliar locations or devices. Where possible, limit these logins. • Regularly update your operating system and the apps you use to patch vulnerabilities that attackers might exploit. Enable automatic updates whenever possible so you don't have to remember yourself. • Utilise security software that can block malicious domains and recognise scams. Join the Daily Record WhatsApp community! Get the latest news sent straight to your messages by joining our WhatsApp community today. You'll receive daily updates on breaking news as well as the top headlines across Scotland. No one will be able to see who is signed up and no one can send messages except the Daily Record team. All you have to do is click here if you're on mobile, select 'Join Community' and you're in! If you're on a desktop, simply scan the QR code above with your phone and click 'Join Community'. We also treat our community members to special offers, promotions, and adverts from us and our partners. If you don't like our community, you can check out any time you like. To leave our community click on the name at the top of your screen and choose 'exit group'.

I help busy people organize their digital clutter. Here are 5 features you should start using on your phone and laptop immediately.
I help busy people organize their digital clutter. Here are 5 features you should start using on your phone and laptop immediately.

Business Insider

timea day ago

  • Business Insider

I help busy people organize their digital clutter. Here are 5 features you should start using on your phone and laptop immediately.

I was trained by Marie Kondo to help people declutter their homes. The results with my clients were dramatic, but there was always an elephant in the room: their digital clutter. So two years ago, I pivoted my business to focus exclusively on digital clutter. Now, high-achieving women reach out because they share a dirty little secret: their digital lives are in chaos. Their email inboxes are out of control. They grimace when I see their desktop. They're resetting passwords daily. And don't even get them started on their photo library. As a tech and productivity coach, I work with them to clear out digital chaos and turn everyday tech into personal assistants. Here are five game-changing hidden features I teach them: Gmail's Priority Inbox feature can help you organize your emails Gmail has a powerful, little-known feature called Priority Inbox, which divides your email into four clear sections: Important and Unread, Starred, Action Needed, and Everything Else. Use Gmail's important flags to train it on what's important and what isn't. Now, your most important emails will always rise to the top, while promotional emails sink to the bottom, making it much easier to unsubscribe and delete. My clients' favorite part? Adding colors and emojis to their newly organized inbox. Checking email begins to feel, dare I say … joyful? Your bookmarks bar can help you organize your tabs Gone are the days when we need to keep 67 tabs open because we're afraid of losing something. With a drag-and-drop, your active projects and most frequently visited sites can be at your fingertips. The trick: bookmark folders. Create folders on your browser's bookmark bar for things like: Italy Trip, Budget Proposal, Summer Camp, and put all of the relevant sites into that folder. Pro tip: Maximize precious bookmark bar real estate by deleting the text in the name of the bookmark and leaving just the logo. Siri and ChatGPT can be effective personal assistants I boss Siri around all day like she's my personal assistant, because she is. "Siri, remind me to take the chicken out to defrost when I get home. Siri, what's the weather going to be today? Siri, text Dad that I'm on my way." My other assistant? ChatGPT. Ask it things like "Help me plan a weekend in the Lower East Side with two toddlers. I'd like a hotel with a pool and free breakfast that's near a playground. Please provide recommendations for family-friendly restaurants." You will be amazed. Use Apple's Groceries list feature and share it with others Apple's little-known Groceries list feature takes the mental load out of grocery shopping. Go to the Reminders app and create a list. For List Type, choose Groceries. Now, when you say "Siri, add apples to the Grocery List," it will magically put apples on the list and auto-categorize them! Share the list with everyone who does the shopping, and be surprised and elated when they come home with something you took five seconds to add to the list a week ago. Try an app to declutter your photos Your phone has a few built-in tools for decluttering photos, but they're lackluster at best. To supercharge your photo organizing, try the CleanerKit app. It will scan your photo library and then suggest what to clear out, including blurry photos, landscapes, and even similar photos. Plus, the Cleaner Kit allows you to declutter month by month, eliminating the overwhelm that keeps most of us stuck staring down 18,000 photos at once. It's time to take advantage of all that our tech has to offer, and these five tips are the perfect place to start.

Hawaiian Airlines hit by cyber attack
Hawaiian Airlines hit by cyber attack

The Star

timea day ago

  • Business
  • The Star

Hawaiian Airlines hit by cyber attack

FILE PHOTO: Hawaiian Airlines airplanes on the runway at the Daniel K. Inouye International Airport in Honolulu, Hawaii, U.S. April 28, 2020. REUTERS/Marco Garcia/File Photo WASHINGTON (Reuters) -Hawaiian Airlines said on Thursday that some of its IT systems were disrupted by a hack, adding its flights were operating as scheduled. In a statement, Hawaiian Airlines said 'some of our IT systems' had been affected by a 'cybersecurity event.' The nature of the event was not disclosed, but that kind of language is typically used in cases of ransomware incidents, where digital extortionists paralyze a victim's computer network until a cryptocurrency ransom is paid. The airline, which is owned by Alaska Air Group, said it had 'taken steps to safeguard our operations, and our flights are operating safely and as scheduled.' Reuters could not immediately ascertain the extent of the disruption at Hawaiian, but a representative responded using a Gmail address when contacted to seek further details. The Federal Aviation Administration said its safety office responsible for airline oversight is in contact with Hawaiian Airlines. "There has been no impact on safety, and the airline continues to operate safely. We are monitoring the situation," the agency said in a statement. (Reporting by Raphael Satter and David Shepardson; Editing by Chris Reese)

Protecting Malaysians in cyberspace more critical as online threats grow
Protecting Malaysians in cyberspace more critical as online threats grow

Borneo Post

timea day ago

  • Business
  • Borneo Post

Protecting Malaysians in cyberspace more critical as online threats grow

Unlike the limited data gathered for national digital services for cybersecurity or to improve performance, tech giants build multi-billion-dollar empires on the back of detailed personal data profiles. – AI IMAGE AS of January 1, 2025, Malaysia recorded 25.1 million social media users, making it one of the most connected populations in the region. Most of these users voluntarily share personal data far beyond what is needed, for example, posting locations, preferences, routines, and sometimes even sensitive information like their children's school details, vaccination records, or holiday plans. Ironically, while there is widespread concern over government or institutional data collection, little attention is paid to how private corporations such as Meta (Facebook), ByteDance (TikTok), and X (formerly Twitter) actively profile users for commercial gain. Facebook once claimed it would never sell user data, yet it infamously shared user data with Cambridge Analytica. This incident became a major scandal in global privacy discussions and involved not just basic data, but detailed personal information used for targeted political manipulation. If there is real concern about data being misused, then platforms that profit from mass data harvesting should be examined with equal, if not greater, intensity. One of the most overlooked realities in the digital age is this: there is no such thing as a free service. Every time a user signs up for a 'free' app or platform, be it social media, navigation tools, or online games, it is an exchange. Users grant access to their personal data, including their usage patterns, preferences, device details, and even contacts, in return for these services. Most people accept the terms and conditions without reading them, unknowingly agreeing to large-scale data collection. Unlike the limited data gathered for national digital services for cybersecurity or to improve performance, tech giants build multi-billion-dollar empires on the back of detailed personal data profiles. This raises the question: why is there so much concern when a government program or national platform transparently collects data for operational or protective purposes, while the daily exploitation by foreign platforms goes largely unchecked? Tech giants like Google and Apple have perfected the art of data collection. Gmail, Google Docs, Google Drive, Apple iCloud, Siri, and Google Photos are all part of systems that continuously collect and analyze user data. This includes not just basic data, but actual content like search terms, voice commands, photos, browse history, and even location. Apple may advertise itself as being focused on privacy, but even its basic data (such as who you called, when, and for how long) is stored. Google, meanwhile, uses user behavior data for advertising, product development, and AI training. Is the public truly informed about how much their data powers Google's AI models or Apple's products? More importantly, where is the outrage when these tech companies push updates that make it harder to opt out of data sharing? It is necessary to ensure fairness, ethical governance, and consent in all forms of data collection, whether by governments or private companies. Nevertheless, we must avoid one-sided anger. A responsible national policy that uses shared data to detect cybersecurity threats or improve digital services should not be attacked while corporate data collection for profit is ignored. Not only that, data is also crucial in fighting online dangers. Protecting Malaysians in cyberspace is becoming more and more critical as online threats continue to grow. Shared user data plays a key role in the fight against cybercrime, helping to automatically detect scams, fraud, and cyberbullying early on. With such incidents on the rise, using data responsibly is essential for public safety. Nevertheless, for such programs to earn public confidence, the role of government oversight cannot be forgotten. It is vital that the Malaysian Communications and Multimedia Commission (MCMC) and all relevant agencies do their part by performing careful checks. They must ensure that any data collected is stored and managed securely according to the highest international standards, making sure strong protections are in place to prevent data breaches. The public's trust depends on this strict oversight and accountability. Instead of debating endlessly, Malaysians should support the government's efforts to build a convenient and safer digital environment for all. Malaysians should answer the question of whether the need to protect the safety of Malaysians is more important than unproven claims of data privacy breaches. * Professor Dr. Selvakumar Manickam is Director, Cybersecurity Research Center, Universiti Sains Malaysia.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store