Google is Quietly Recording Everything You Say

Thanks to a function of their search software, Google could have years worth of your conversations recorded, and you can hear it for yourself. Your cringe-worthy history can be heard and viewed along with a list of all your searches, at your personal Google history page.

The feature was built into Google’s search function as a means of delivering accurate search results. However, the sheer accuracy and amount of data Google stores is chilling.

The good news is that you can turn it off and delete it, and at the end of this article, we will show you how.

As the Independent reports:

The recordings can function as a kind of diary, reminding you of the various places and situations that you and your phone have been in. But it’s also a reminder of just how much information is collected about you, and how intimate that information can be.

You’ll see more if you’ve an Android phone, which can be activated at any time just by saying “OK, Google”. But you may well also have recordings on there whatever devices you’ve interacted with Google using.

However, even if you don’t have an Android phone and conduct Google searches on iDevices, Google is still listening.

When visiting your personal history page that the web giant keeps on you, it will show you everywhere Google has a record of you being on the internet.

Of course, Google claims that this information is never personally used against you and is done solely for the purpose of enlightening your experience on the web. However, imagine the ominous implications if this information was being used against you.

Google now processes over 40,000 search queries every second on average, which translates to over 3.5 billion searches per day and 1.2 trillion searches per year worldwide.

The data from these searches is then stored on each individual who conducts them. Using this data or steering results in a particular direction, the internet behemoth could effectively influence the entire world. Aside from influence, Google could predict the future based on trends.

Much of this search history is tied location data retrieved from the device being used to conduct the query. So, not only does the search engine have information on what your interests are, it has you specific interests based on where you are at any given moment.

Google’s motto of Don’t Be Evil now seems like less like a request for its users and more like a way of keeping themselves in check.

Now for the good news — you can turn all of this off.

You can start this eye-opening journey by heading to Google’s history page and looking at the long list of recordings. The company has a specific audio page as well as their record of where you’ve been on the internet.

If you’ve never disabled the feature, you will see a list of audio recordings, even some done outside of the Google app, as well as a transcript of the audio Google has converted to text.

What we recommend, after you further panic by listening to or scrolling through Google’s creepy recordings of your search history, is to delete them all and disable the functions.

The Independent explains just how to do this:

To delete particular files, you can click the check box on the left and then move back to the top of the page and select “delete”. To get rid of everything, you can press the “More” button, select “Delete options” and then “Advanced” and click through.

The easiest way to stop Google recording everything is to turn off the virtual assistant and never to use voice search. But that solution also gets at the central problem of much privacy and data use today – doing so cuts off one of the most useful things about having an Android phone or using Google search.

Now that you know this exists quit voluntarily handing over your data to unknown parties and share this article with your friends and family to show them how to stop it as well.

Source

 
4 Kudos
You are
awsome 🙂

Scientists say giant asteroid could hit earth next week, causing mass devastation

Scientists have discovered a massive asteroid that is on course to hit the Earth next week, and are scrambling to find a way to divert the object.

The asteroid has been named 2016-FI and measures approximately 1 km across. If it strikes a populated area is could wipe out entire cities and potentially devastate an entire continent or … nah. I’m totally messing with you. There’s no asteroid (at least not about to strike next week).

But there is a new study by computer scientists at Columbia University and the French National Institute that has found that 59 percent of links shared on social media have never actually been clicked, meaning that most people who share news on social media aren’t actually reading it first.

For the study, Arnaud Legout and co-authors collected two data sets:

the first, on all tweets containing Bit.ly-shortened links to five major news sources during a one-month period last summer; the second, on all of the clicks attached to that set of shortened links, as logged by Bit.ly, during the same period. After cleaning and collating that data, the researchers basically found themselves with a map to how news goes viral on Twitter.

The map showed “viral” news is widely shared but not necessarily read.

According to the Washington Post, one thing study authors say is concerning about this is that it shapes the way we see the world.

Legout said in a statement:

“People are more willing to share an article than read it. This is typical of modern information consumption. People form an opinion based on a summary, or a summary of summaries, without making the effort to go deeper.”

This probably won’t shock most people. We see it all the time in comments sections – people making loud proclamations about stories they clearly haven’t read. Entire discussions are chaired by those who didn’t actually RTFA (Read the Fucking Article). It’s maddening.

What can you do about it?

RTFA, of course, and don’t share things you haven’t read. Being informed is being responsible.

So, have you made it this far or are you busy building a makeshift shelter in your basement?

If you read it, and want to comment, work a colour – red, blue, yellow, pink, whatever – into your comment, would you? But don’t ruin the headline for everyone else, OK? Thanks. You’re the best.

 
0 Kudos
You are
awsome 🙂

The 25 Most Popular Passwords of 2015: We’re All Such Idiots

The 25 Most Popular Passwords of 2015: We’re All Such Idiots

passwords

The 25 Most Popular Passwords of 2015

It’s 2016 and you may have thought we’d all be a little older and wiser than this time last year. But as you read this list of 2015’s most popular passwords, you will shake your head, mumble unmentionables and reach the firm conclusion that, no, we are in fact all still complete and utter morons.

Every year, SplashData complies a list of the millions of stolen passwords made public throughout the last twelve months, then sorts them in order of popularity. This year the results, based on a total of over 2 million leaked passwords, are not the list of random alpha-numeric characters you might hope for. Rather, they’re a lesson in exactly how not to choose a password.

Yes, “123456″ and “password” remain bewilderingly popular.

But anyway, without further ado, here’s the list, direct from Splash Data. Brace yourselves.

1. 123456 (Unchanged)

2. password (Unchanged)

3. 12345678 (Up 1)

4. qwerty (Up 1)

5. 12345 (Down 2)

6. 123456789 (Unchanged)

7. football (Up 3)

8. 1234 (Down 1)

9. 1234567 (Up 2)

10. baseball (Down 2)

11. welcome (New)

12. 1234567890 (New)

13. abc123 (Up 1)

14. 111111 (Up 1)

15. 1qaz2wsx (New)

16. dragon (Down 7)

17. master (Up 2)

18. monkey (Down 6)

19. letmein (Down 6)

20. login (New)

21. princess (New)

22. qwertyuiop (New)

23. solo (New)

24. passw0rd (New)

25. starwars (New)

There are some interesting trends, if you can get beyond the sheer stupidity for a moment. Sports-based passwords are still popular, with “football” and “baseball” both ranking highly, and so are those inspired by a certain blockbuster film, with “starwars” and “solo” making an appearance.

It’s also nice to see the return of “princess,” which dropped out of the Top 25 last year but has made a resurgence, also potentially due to Star Wars. Elsewhere, other new entires—including “welcome,” “login” and “passw0rd”—are just as hackable but far more amusingly dumb.

Now is the point at which we should provide some advice about how to create a strong password. But here’s the best piece of advice we have: let’s all stop being such fucking idiots.

 
1 Kudos
You are
awsome 🙂

These Secret Netflix Codes Can Reveal Tons of Hidden Categories

These Secret Netflix Codes Can Reveal Tons of Hidden Categories

Netflix

Netflix has tons of great content, but it can be hard to find it all if you don’t know what you’re looking for. The site’s algorithms show you what it thinks you want to watch, but these codes can help you venture outside the suggested depths.

Netflix fan site What’s On Netflix has a helpful list of codes that can reveal a multitude of narrow categories and category combinations that Netflix may not readily reveal to. To manually explore a category simple enter the following URL:

http://www.netflix.com/browse/genre/INSERTNUMBER

Then, replace INSERTNUMBER with one of the codes from the site below. What’s On Netflix has dozens of numbers for very specific categories, including everything from B-Horror Movies to Anime Fantasy. Check out the full list at the source link below.

The Netflix ID Bible – Every Category on Netflix | What’s On Netflix

 
2 Kudos
You are
awsome 🙂

Microsoft will Inform You If Government is Spying on You

Following in the footsteps of Twitter, Facebook and Google, Microsoft promises to notify users of its e-mail (Outlook) and cloud storage (OneDrive) services if government hackers may have targeted their accounts.
The company already notifies users if an unauthorized person tries to access their Outlook or OneDrive accounts. But from now on, the company will also inform if it suspects government-sponsored hackers.

Ex-Employee: Microsoft Didn’t Notify When China Spied Tibetans Leaders

The move could be taken in the wake of the claims made by Microsoft’s former employees that several years ago Chinese government hacked into more than a thousand Hotmail email accounts of international leaders of Tibetan and Uighur minorities, but the company decided not to tell the victims, allowing the hackers to continue their campaign.
Instead of alerting those leaders of the hacking attempts, Microsoft simply recommended them to change their passwords without disclosing the reason, after an internal debate in 2011, Reuters reported.
However, Microsoft announced Wednesday that if the company strongly suspects that your account is being hijacked or targeted by hackers working in the interest of a nation-state, it will notify you via an email.
Here’s what Microsoft Vice President Scott Charney writes:

“We’re taking this additional step of specifically letting you know if we have evidence that the attacker may be ‘state-sponsored’ because it is likely that the attack could be more sophisticated or more sustained than attacks from cybercriminals and others. These notifications do not mean that Microsoft’s own systems have in any way been compromised.”

Just last week, Yahoo promised to alert its users whom it suspected were being spied on by state-sponsored hackers. Other big tech companies including Twitter, Facebook and Google, had previously assured their users that they would notify them of any potential government spying.
And now Microsoft is the latest company to join the list.

Government: We’ll Sue You if You Do That!

This is a good news for Microsoft users, but it seems that the United Kingdom is not happy with this decision by all the major tech firms, because the country seeks access to personal communications in order to fight terrorism and protect national security.
The UK government is pushing a new Investigatory Powers Bill that will take the bosses of any company that warns its users that security organizations, such as GCHQ (the Government Communications Headquarters), MI5 and MI6, are spying on them.
Specifically, UK ministers want to make it a criminal offence for Twitter, Google and other tech firms under which they could face up to two years in prison.

 

 
0 Kudos
You are
awsome 🙂

Malicious malware detected in GTA V mods

Several Grand Theft Auto V for PC mods found to have viruses and malware

In the world of PC gaming, the Mods play a very important role in it. Mods take an original base of a game, and with some twists, you get carried to a totally different world. However, it looks though at least one person has decided to take advantage of the circumstances and include the malicious code within without the knowledge to those who download it.

The hugely popular No Clip and Angry Planes mods for Grand Theft Auto V are said to come with malicious code. This only emphasizes the importance of performing scans on the files you download with proper and updated anti-virus and anti-malware tools before you install them.

GTA Forum consisting of seven members carried out an investigation after realizing that Angry Planes had began to misbehave. It was found that an odd C# compiler program was running in the system processes, transmitting and receiving data across the web. A Fade.exe executable was found in his PC’s Temporary Files folder that kept a watch on his activity and changed his Windows registry to silently launch at system boot.

The other user who checked out the malware stated that he had used his PC to take part in a DDoS attack against a Twitch game streamer. Other modules that were found to be active inside the malware include a Facebook spam/credential stealing module, a Messenger.com spam/credential stealing module, a Twitch spam/credential stealing module, a Keylogger module, a Steam spamming module, and a UDP flooding module.

Malwarebytes, a Security firm that thorough examined the malicious files that were shared via the fraud has been identified by the security firm as Trojan-Agent-TRK – in a Malwarebytes blog post.

As told to EI Reg, Chris Boyd, a security researcher at Malwarebytes and an enthusiastic gamer stated that the flexible malicious ad-ons towards gamers is a fairly common action.

“Game mods have been a target for many years, with an older version of GTA coming under fire from a notorious GTA: Hoodlife fake mod containing malware back in 2007,” Boyd explained.

“Fans of the series traditionally enjoy extending the lifespan of the title through modding, so it’s a rich area of exploitation for malware authors. Rockstar could potentially increase mod safety by opening up the Steam workshop to mod downloads, but it seems that option isn’t available yet,” he said.

“If there is no push to host mods on Steam, then gamers will have to rely on third-party sites for downloads. It’s a lot easier for bad files to slip through on forums and fan-made websites than a service such as Steam with various checks and security features in place behind the scenes,” he added.

In case, you are using No Clip or Angry Planes with any mod or GTA V, it is advisable to carry out an anti-malware scan with one of the AV programs that identified the malicious file. It is also advisable to change your passwords to be more secure.

 
0 Kudos
You are
awsome 🙂

Twitch ’s latest insane adventure: Installing Linux

Twitch’s latest insane adventure: Installing Linux

Twitch playing Pokémon was easy mode. Tomorrow, Twitch viewers will be invited to do something altogether more challenging: install Arch Linux. Using the same Twitch chat-driven concept as the collaborative Pokémon playthrough, anyone will be able to enter commands and control the installation process.

Normally, installing Linux is quicker and easier than winning Pokémon. The install processes have been made broadly idiot-proof, especially if you’re installing into a safe virtual machine environment and so don’t even run the risk of clobbering a disk accidentally. But if Twitch chat has accomplished anything, it’s breeding a better idiot, one that is mindlessly bloody-minded, and so we fully anticipate that there will be trolling. Trolling Pokémon revolved principally around getting stuck repeatedly in menus and releasing captured Pokémon—annoying to those trying to complete the game but little that would force players to start from scratch.

Linux, in contrast, opens the door to a whole world of exotic trolling opportunities. There are old classics such as rm -rf / to wipe the disk, or dd if=/dev/zero of=/dev/hda to really wipe the disk. There’s the casual annoyance of kill -9 1, or comedy options such as the bash fork bomb of :(){ :|:& };:. We wouldn’t be surprised to see the machine casually trapped in a reboot loop or have its hardware removed to leave it incapable of I/O.

And who knows, even more exotic options are also possible; security attacks to break into the virtual machine host, recruiting of the machine into botnets, or denial of service attacks. Also possible: a ton of copy-pasta and Kappa spam. Twitch wouldn’t really be Twitch without it.

The project kicks off on Saturday October 31 at 4pm Eastern.

 
3 Kudos
You are
awsome 🙂

Government Grade Malware: a Look at HackingTeam ’s RAT

Government Grade Malware: a Look at HackingTeam’s RAT

malware2Security researchers the world over have been digging through themassiveHackingTeam dump for the past five days, and what we’ve foundhas been surprising. I’ve heard this situation called many things, and there’s one description that I can definitely agree with: it’s like Christmas for hackers.

“On the fifth day of Christmas Bromium sent to me a malware analysis B-L-O-G” – You

(more…)

 
12 Kudos
You are
awsome 🙂

My Traffic Value Review

Name: My Traffic ValueMy Traffic Value
Website: www.MyTrafficValue.com
Price: Free to Join
Owner: Joel William Cook
Who it is for: Newbie – Expert
Rating: star,full,favourite,bookmarkstar,full,favourite,bookmarkstar,full,favourite,bookmarkstar,full,favourite,bookmarkstar,half,favourite,bookmark

Introduction To My Traffic Value

In this My Traffic Value Review I’m going to show you how the site works and I’m going to explain all the important information.

My Traffic Value (MTV) is a crowdfunding Platform made by Joel William Cook in 2011. Joel William Cook is an expert marketer also founder of Paid Verts who created a stable system which is working for 3 years and growing day by day.

(more…)

 
9 Kudos
You are
awsome 🙂