Google Faces EU Monopoly Law Over Android Dominance

Google has been issued formal antitrust charges over claims that it abuses the dominant position of its Android operating system.

The European Commission (EC) sent a statement of objections to the tech firm, alleging that it has breached EU competition law. Google is accused of placing onerous requirements on firms using Android and stifling competition.

It said Android was "good for competition and good for consumers". Kent Walker, Google's senior vice president and general counsel, said: "Android has helped foster a remarkable and, importantly, sustainable ecosystem, based on open-source software and open innovation. We look forward to working with the European Commission."

The initial complaints from rivals were lodged with the commission in 2009. However, many of the companies that complained said, they had been adversely affected by Google's search algorithms for years beforehand. A formal investigation began in 2010.

The initial complaints were all about comparison shopping, looking for the best price for goods across different websites. The commission alleges that when people do a shopping search, the results they get back are weighted towards Google's services even if those results are not the most relevant.

Competition commissioner Margrethe Vestager said the matter could set a precedent for the way it judged other complaints about Google. The watchdog said she was also considering investigating Google's conduct when people searched for hotels and flights, and got maps in their results.
The commission has also received complaints about how Google scrapes websites and uses the content it finds and on how it works with its advertising partners.

Ms. Vestager also announced her team had launched a separate investigation into Google's mobile operating system Android.

She said the commission was concerned that Google was abusing its dominance in the smartphone and tablet market to give its own services, such as search, more prominence.

BBC: http://bbc.in/1VE92RB & http://bbc.in/1rqdQhp

« Snowden On Police Chasing Journalist’s Data
Russia Blamed For Swedish Air Traffic Hack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

Cryptoloc

Cryptoloc

Cryptoloc's core business is developing solutions designed to protect businesses from all kinds of security threats using a unique patented cryptography.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

Digital Security Authority (DSA)

Digital Security Authority (DSA)

The establishment of the Digital Security Authority, which incorporates the National CSIRT, is crucial to significantly raising the cybersecurity posture and capabilities of Cyprus.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.