Researcher published a dangerous Windows 10 zero-day exploit
infosec

Researcher published a dangerous Windows 10 zero-day exploit

A security researcher today revealed at GitHub the existence of a zero-day vulnerability in Windows 10. Zero-day vulnerabilities are often called ...
Read More
infosec

School in Ohio fell victim to attack hacking with Trickbot

On Friday, a school in Ohio discovered he was hacked. In particular, malicious software infected systems and so ...
Read More
infosec

AMSA alerts users to phone frauds

AMSA has warned that it has received reports that its phone number has been used to make phishing via telephone ...
Read More
inet infosec

Does industrial robots increase the risk of cyber attacks?

The use of robots in industrial environments has greatly changed the conditions under which the various jobs are being done in the last ...
Read More
infosec

Cyber ​​warfare: What is it and which domains it affects?

The term cyber warfare refers to online warfare between governments by performing complex internet attacks. These carriers ...
Read More
Latest Posts

Gmail: Third-party apps can read your email

Software vendors can create services combined with features provided by Google's Gmail, such as linking the user to the service with their Google account. According to a statement, companies and developers of each company can access the emails received or sent by the Gmail account.

gmail third party access

In particular, the report was talking about 2 applications. One of the two is Return Path, an application that analyzes Inboxes and collects information for vendors. Prior to 2 years, Return Path employees read about 8.000 emails to create and train their current platform.

The second application is called Edison Software, and helps its users keep their emails more organized. To train a "Smart reply" function, it is reported that employees read thousands of emails from platform users.

In the developers industry, it is not so shocking that app developers have access to such data. Both applications claim to have written permission from all users through the terms of use. OR Google follows the same tactic when it comes to giving the data access to a third application, and where appropriate inquires about the license.

Return Path reported in one blog post "Every time our developers control emails on our panel (which is fully compatible with our policies), we make sure we limit who has access to these data, supervising the slightest traffic."

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *