Categories
State Business and Economy News

Browsing in incognito mode doesn’t protect you as much as you might think [Video]

Although a private browsing mode known as “Incognito” in Google’s widely used Chrome browser has been available for nearly a decade, a legal settlement involving the way it works has cast new attention on this commonly available setting.The settlement disclosed Monday in a federal court is primarily designed to ensure that users who use Incognito mode in Chrome get more privacy while surfing the internet than they had been previously.Although Google isn’t paying any money to consumers, the lawyers who filed the case in June 2020 believe the stricter safeguards will be worth $4.75 billion to $7.8 billion, based on the estimated value of the personal information protected by the settlement.Nearly every major browser now has a private browsing mode. Here’s a look at what they do and don’t do for surfers.What private browsing actually doesWhen you turn on your browser’s private mode, think of it as a fresh start.So all of the advantages of browser personalization won’t be there: No suggestions based on your history, autocomplete will be largely unavailable and you will have to sign into your accounts.As soon as you close your incognito window, your internet browser wipes the browsing history and any cookies that have been created during that session, according to the Mozilla Foundation, meaning — locally to your device your browser won’t remember where you’ve been or store any information you filled into any forms.This kind of experience does have its uses. For example, making sure searches on more sensitive topics, like health care, don’t show up in your browsing history (which may invite related ads to start showing up). Or perhaps you’d like added protection when surfing or logging onto accounts on public computers, like at the library or a hotel business center.What private browsing doesn’t doRemember that the point of a private browsing mode is not to cover the fact that you visited a website but to cover the fact that you visited that site from your device.Incognito modes generally do not prevent the websites you visit from seeing your location, via your IP address, or stop your internet service provider from logging your activities. As long as your IP address is visible, the Mozilla Foundation says your identity and activity remain fully exposed to search engines and third parties think advertisers regardless of what mode your browsing in.To illustrate this point, Google recently agreed to purge billions of records containing personal information collected from people using incognito mode to surf the internet as part of a settlement over a lawsuit accusing the search giant of illegal surveillance. It also has to be make more prominent privacy disclosures in its terms of service to let people know about its data collection efforts.Google will also be required to set up Incognito mode so users will be able to automatically block “cookies” that enable third parties to track them during the next five years if a federal judge approves the settlement after a court hearing scheduled July 30.And any files you may download or bookmarks you create during a private session are not wiped at the end of your session, meaning you are still susceptible to computer viruses, malware and keystroke loggers.Are there options for more private browsing?A virtual private network can run interference for your IP address, making it harder for sites to track you. But the use of VPNs also raises additional security questions, especially for users who go with a free or cheap VPN provider they haven’t carefully vetted.Some search engines like DuckDuckGo are more privacy focused and have pledged to never collect personal information or track people entering queries on its site. And certain browsers like Tor are designed to make it more difficult for third-party trackers and advertisers to track you.Even with all of these options, just remember that it’s unlikely that you’re truly anonymous online.

Categories
Breaking News

Scathing federal report rips Microsoft for shoddy security [Video]

In a scathing indictment of Microsoft corporate security and transparency, a Biden administration-appointed review board issued a report Tuesday saying a cascade of errors by the tech giant let state-backed Chinese cyber operators break into email accounts of senior U.S. officials including Commerce Secretary Gina Raimondo.The Cyber Safety Review Board, created in 2021 by executive order, describes shoddy cybersecurity practices, a lax corporate culture and a lack of sincerity about the company’s knowledge of the targeted breach, which affected multiple U.S. agencies that deal with China.It concluded that Microsoft’s security culture was inadequate and requires an overhaul” given the company’s ubiquity and critical role in the global technology ecosystem. Microsoft products underpin essential services that support national security, the foundations of our economy, and public health and safety.The panel said the intrusion, discovered in June by the State Department and dating to May was preventable and should never have occurred, blaming its success on a cascade of avoidable errors. What’s more, the board said, Microsoft still doesn’t know how the hackers got in.The panel made sweeping recommendations, including urging Microsoft to put on hold adding features to its cloud computing environment until substantial security improvements have been made.It said Microsoft’s CEO and board should institute rapid cultural change including publicly sharing a plan with specific timelines to make fundamental, security-focused reforms across the company and its full suite of products.In a statement, Microsoft said it appreciated the boards investigation and would continue to harden all our systems against attack and implement even more robust sensors and logs to help us detect and repel the cyber-armies of our adversaries.In all, the state-backed Chinese hackers broke into the Microsoft Exchange Online email of 22 organizations and more than 500 individuals around the world including the U.S. ambassador to China, Nicholas Burns accessing some cloud-based email boxes for at least six weeks and downloading some 60,000 emails from the State Department alone, the 34-page report said. Three think tanks and four foreign government entities, including Britain’s National Cyber Security Center, were among those compromised, it said.The board, convened by Homeland Security Secretary Alejandro Mayorkas in August, accused Microsoft of making inaccurate public statements about the incident including issuing a statement saying it believed it had determined the likely root cause of the intrusion when, in fact, it still has not. Microsoft did not update that misleading blog post, published in September, until mid-March after the board repeatedly asked if it planned to issue a correction, it said.Separately, the board expressed concern about a separate hack disclosed by the Redmond, Washington, company in January this one of email accounts including those of an undisclosed number of senior Microsoft executives and an undisclosed number of Microsoft customers and attributed to state-backed Russian hackers.The board lamented a corporate culture that deprioritized both enterprise security investments and rigorous risk management.The Chinese hack was initially disclosed in July by Microsoft in a blog post and carried out by a group the company calls Storm-0558. That same group, the panel noted, has been engaged in similar intrusions compromising cloud providers or stealing authentication keys so it can break into accounts since at least 2009, targeting companies including Google, Yahoo, Adobe, Dow Chemical and Morgan Stanley.Microsoft noted in its statement that the hackers involved are well-resourced nation state threat actors who operate continuously and without meaningful deterrence.The company said it recognizes that recent events have demonstrated a need to adopt a new culture of engineering security in our own networks, adding it has mobilized our engineering teams to identify and mitigate legacy infrastructure, improve processes, and enforce security benchmarks.