Monday, February 20, 2023

Landmark Lawsuit Could Force Google to Divest Ads

 

A lawsuit filed by the United States Justice Department targets Alphabet’s Google and its monopoly in the advertising space. If the case succeeds, rivals of Google Ads, such as Apple, Meta, Microsoft, and Amazon could find an advantage. However, advertisers would have an uncertain future in this scenario.

The Justice Department demanded in the complaint that Google divest its Ad Manager, a suite of tools that allows websites to distribute ads and find customers based on their interests, gender, location, and more.

Apple has been swiftly increasing its emerging advertising sector, endorsing its privacy features, and could be a budding contender if Google Ads loses its stronghold. Since Apple’s data is compiled through phone ownership, its Safari web browser, and the dispersal of applications through its app store, it will have the ability to swiftly diversify its focus into the ad realm.

If the lawsuit filed by the Justice Department succeeds, advertisers and publishers will both experience more leverage with multiple options and an entirely new roster of players. With that comes more competition, as the space will open up to many others.

Google’s advertising competitors are constantly developing new products for publishers (news websites) and advertisers buying those ads. If Google is forced to divest, competitors such as Microsoft’s Xandr will have an edge, as they will continue to work with both sides.

The gains will also come financially for publishers, as they will have more options, inevitably driving down the overall cost in the sector. As more competition emerges, Google Ads will predictably become less effective.

This is not the first time the government has filed lawsuits against dominant companies in an effort to break up monopolies. In 1974, a lawsuit broke up AT&T, which resulted in many advancements and innovations in the telephone industry. In 1998, the Justice Department filed a suit against Microsoft aimed at reining in the company by prohibiting them from extending its dominant operating system to the internet browser. Ironically, the Justice Department and Microsoft settlement paved the way for other internet innovators such as Google.

_______________________________

Founded in 1994, Creative Programs and Systems provides professional results for all computer needs. We design, create, and code an array of custom software programs and websites; offer top-notch digital marketing services including enhanced Search Engine Optimization (SEO) and paid advertising; repair and provide support for computers of both residential and professional nature; build custom systems and servers, and offer secure data backups. Need assistance or want to learn more? Call us at 810-224-5252 or e-mail info@cpsmi.com.

Written by the digital marketing team at Creative Programs & Systems: https://www.cpsmi.com/ 

Tuesday, November 15, 2022

Web Browsers Spellcheck Can Unveil Passwords

 

Google Chrome and Microsoft Edge are two Internet browsers that use extended spellcheck features to transmit form data, including Personally Identifiable Information (PII) and passwords to their parent companies. 

While this feature is intended to assist the browser user, it does raise privacy concerns and calls the efficacy of password protection to question.  

“Spell-jacking” is the term used to describe the process of a browser sending PII from spellcheck to Google, Microsoft, and the like. Transmitted PII form data can include Social Security Numbers, Social Insurance Numbers, personal names, addresses, e-mails, dates of birth, contact information, bank information, and so much more. 

Josh Summit, co-founder and CTO of JavaScript security firm otto-js, unearthed this issue while testing script behaviors for his company. When Google Chrome Enhanced Spellcheck or Microsoft Edge Editor is enabled, nearly everything you type in form fields is instantaneously transmitted to Google and Microsoft. Clicking on “show password” can spell-jack your data. 

Summit stated, “Some of the largest websites in the world have exposure to sending Google and Microsoft sensitive user PII, including username, e-mail, and passwords, when users are logging in or filling out forms. An even more significant concern for companies is the exposure this presents to the company’s enterprise credentials to internal assets like databases and cloud infrastructure.” 

Though the transmission of form fields is securely sent through HTTPS, what happens to the user data after it reaches Google’s server, for example, is not exactly clear. Some companies have mitigated the issue by adding ‘spellcheck=false’ to all input fields; however, this could cause problems for users who can no longer use the spellcheck feature. 

Google Chrome and Microsoft Edge users can turn off spellcheck (or remove Edge’s Editor add-on) until the companies revise their code to exclude passwords and other PII from sensitive fields. 

Do you need assistance with adding or removing spellcheck from your browser? Has your data already been compromised? Contact the computer experts at CPS today - we can assist!  

Founded in 1994, Creative Programs and Systems provides professional results for all computer needs. We design, create, and code an array of custom software programs and websites; offer top-notch digital marketing services including enhanced Search Engine Optimization (SEO) and paid advertising; repair and provide support for computers of both residential and professional nature; build custom systems and servers, and offer secure data backups. Need assistance or want to learn more? Call us at 810-224-5252 or e-mail info@cpsmi.com.

Written by the digital marketing team at Creative Programs & Systems: https://www.cpsmi.com/

 

Tuesday, October 18, 2022

 

What’s the Big Deal Regarding ‘Zero-Day’?

“Zero-day” is becoming a more popular term to describe recently discovered security vulnerabilities exposed by hackers and used to infiltrate computer systems. The phrase literally means the developer has zero days to fix the issue caused by hackers. 

Zero-day threats are unprecedented virus attacks that exploit either a new variant of malware or previously unknown software (zero-day vulnerability). Since these malware viruses are unique, they are impossible to detect by typical signature-matching tactics. Zero-day is sometimes written as 0-day, and the term is often associated with the words: vulnerability, exploit, and attack. Keep reading to learn the difference between the three. 

Zero-Day Vulnerability
Hackers unearth these software vulnerabilities before vendors can be made aware of them; therefore, no patch or fix exists, making them more likely to infiltrate systems.

Zero-Day Exploits
This term refers to the hacking method used to attack systems with a previously unknown vulnerability. 

Zero-Day Attack
The actual term describes the execution of a zero-day exploit to cause damage or steal data from an unprotected system. 

Hackers can exploit security vulnerabilities found in software, called exploit code, and ultimately wreak havoc before developers can remedy the situation. When anti-virus companies release “patch” updates, they are essentially covering a hole that was previously discovered by hackers. Unfortunately, this process can take months, as these security vulnerabilities are not immediately distinguished. 

Signature matching is a specific strategy used to identify malware by analyzing samples of destructed data to create a signature file and then distributing an update for anti-virus software to identify the specific signature. Zero-day threats can sneak past these signature matching tactics, ultimately affecting many victims. 

Zero-day attacks are immensely dangerous and typically aimed at operating systems, web browsers, office applications, open-source components, hardwired firmware, Internet of Things (IoT), and more. Potential victims include those who use a browser or operating system, intellectual data property owners, run hardware, firmware, and the IoT through large businesses, organizations, government agencies, etc. 

Cyber threats are continually infecting thousands of computers with zero-day threats. To protect your network, applications, and data, contact the experts at CPS. Our engineers can engage an advanced threat prevention system that can test untrusted files, links, and e-mails before they get to you.

Founded in 1994, Creative Programs and Systems provides professional results for all computer needs. We design, create, and code an array of custom software programs and websites; offer top-notch digital marketing services including enhanced Search Engine Optimization (SEO) and paid advertising; repair and provide support for computers of both residential and professional nature; build custom systems and servers, and offer secure data backups. Need assistance or want to learn more? Call us at 810-224-5252 or e-mail info@cpsmi.com.

Written by the digital marketing team at Creative Programs & Systems: https://www.cpsmi.com/