Google's latest IP protection feature for Chrome is like the superhero cape for your online privacy, swooping in to save the day. It's their way of saying, "Hey, we may have ditched 'don't be evil,' but we're still here for you." The feature promises to shield users from cross-site tracking, the internet's version of someone following you around the grocery store and noting every item in your cart.
Now, Google's grand plan involves routing all your data through their servers with a two-hop proxy. Picture it like a relay race where the first baton pass is to a Google server and the second is to a CDN. It's like a secret agent operation, only instead of spies, it's your data taking on a covert mission. But, hold your horses, if the CDN has a secret alliance with Google or is part of the Alphabet family (which, surprise, owns Google), there might be some data collection shenanigans going on.
In the anti-abuse section of their proposal, Google says you'll need to be logged in for this magic to happen. They claim the proxy won't play detective and connect your traffic to a user account. Well, that's reassuring, coming from the folks who've turned data-selling into an art form. The implementation of this feature is like waiting for the grand finale of a magic show – let's see if the disappearing act actually works.
And now, let's mosey on over to the farm where even cows are caught up in the whirlwind of IoT devices. In the good old days, cows would leisurely graze, blissfully unaware of the digital era. Fast forward to today, farmers are outfitting them with smart collars. However, a team of researchers has found some chinks in the cows' digital armour. They've reverse-engineered the wireless protocol, playing a high-stakes game of cow-themed espionage. If these smart collars were part of the internet at large, it would be a moo-ving argument for beefing up security. Just imagine a cow facing a ransomware attack – udder chaos!
Breach Exposure Monitoring | Dark Web Monitoring + Surface Web Monitoring
Scan Any Domain for Free https://breachaware.com/scan
THIS MONTHS SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
US nuclear research facility has been compromised.
https://breachaware.com/research/us-nuclear-research-facility-has-been-compromised
A total of 13 breaches were found and analysed resulting in 1,873,089 leaked accounts containing a total of 19 different data types. The breaches found publicly and freely available included MPL Esports Update [URL Redirected], Stealer Log 0383, Ace Online (Israel), Stealer Log 0384 and Stealer Log 0386.
Next-gen smart home tech company warned "I may release the entire breach for free."
https://breachaware.com/research/next-gen-smart-home-tech-company-warned-i-may-release-the-entire-breach-for-free
A total of 28 breaches were found and analysed resulting in 146,769,692 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included Dubsmash (2), Reverb Nation, Work 5, Wobi and Medical Company Nauka.
“The battle for Omegle has been lost, but the war against the Internet rages on."
https://breachaware.com/research/the-battle-for-omegle-has-been-lost-but-the-war-against-the-internet-rages-on
A total of 32 breaches were found and analysed resulting in 3,371,685 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included Stealer Log 0377, Stealer Log 0378, iD Tech, My Book Qatar and Utel Universad.
Unsuspecting government, police, and military recipients will be receiving a fresh wave of links to believable phishing sites.
https://breachaware.com/research/unsuspecting-government-police-and-military-recipients-will-be-receiving-a-fresh-wave-of-links-to-believable-phishing-sites
A total of 17 breaches were found and analysed resulting in 3,775,020 leaked accounts containing a total of 22 different data types. The breaches found publicly and freely available included Stealer Log 0375, Stealer Log 0372, Stealer Log 0374, Stealer Log 0373 and 585Gold.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.




Weekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESSchedule a Demonstration
MAKE THE SMART CHOICE TODAY