Language Selection

English French German Italian Portuguese Spanish

Google Web Accelerator sparks privacy fears

Filed under
Security
Web

Google Web Accelerator, which was released in beta, is set up to automatically work with Firefox and Internet Explorer once it's been downloaded. The service stores copies of sites frequently accessed by individual PCs and automatically retrieves new data from those pages, so that a Web browser needs to process only updates to those sites when asked to load them. It can also automatically "pre-fetch" frequently used Web sites before the user downloads it.

However, users are concerned that the service can cache more data from their computers than they would prefer.

On a Google Labs discussion group, one user said that the security implications of Google caching details of Internet sessions were unacceptable.

"I went to the Futuremark forums and noticed that I'm logged in as someone I don't know. Great, I've used Google's Web Accelerator for a couple of hours, visited lots of sites where I'm logged in. Now I wonder how many people used my cache. I understand it's a beta, sure, but something like that is totally unacceptable."

Google was not immediately available for comment, but said in a Web site statement that the service can receive information such as the user's IP address, computer and connection information, and "personally identifiable information", such as an e-mail address.

Full Story.

More in Tux Machines

Leftovers: KDE/Qt

Leftovers: OSS

Security Leftovers

  • DNS server attacks begin using BIND software flaw
    Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses. Last week, a patch was issued for the denial-of-service flaw, which affects all versions of BIND 9, open-source software originally developed by the University of California at Berkeley in the 1980s.
  • Researchers Create First Firmware Worm That Attacks Macs
    The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren’t. It turns out this isn’t true. Two researchers have found that several known vulnerabilities affecting the firmware of all the top PC makers can also hit the firmware of MACs. What’s more, the researchers have designed a proof-of-concept worm for the first time that would allow a firmware attack to spread automatically from MacBook to MacBook, without the need for them to be networked.

Brocade CEO: Transition To Open Source Will Be Difficult For Cisco

Communications CEO Lloyd Carney said traditional vendors like Cisco will have a tough time adapting to a more software-defined, open source space. That's because traditional vendors like Cisco's revenue streams are tied to closed architectures, Carney said. Read more