Google’s New Security Features

Google’s annual developer conference began with several announcements, including a list of new products and services that Google will be releasing in the future. 

These products and services aim to improve users’ security and protect privacy and Google is understood to be working on a new virtual card tool that would be accessible in Android devices and in the Chrome browser for Mac and PC. 

Google’s Virtual Cards is a new feature on Android and Chrome. When you autofill to enter your payment details at checkout, virtual cards will add an additional layer of security by replacing your actual card number with a virtual number.

In the event of a data breach, the virtual card number can be replaced, and you won't have to deal with replacing your physical card. Apple has the same type of feature for the Apple Card. Google's virtual cards are expected to launch this summer. 

This feature is different than Apple Pay and aims to improve security by allocating a virtual card number to each vendor when you purchase something online. This will protect credit card details in the event of a data breach.

With the new virtual card feature, the number given to the vendor can be replaced, rather than the physical card. Google’s virtual cards are expected to launch this summer, along with a new function that allows users to check their account safety and monitor the status of accounts. 

This will be coupled with more phishing alerts, and a new tool that allows users to flag data, such as addresses or phone numbers, found in public searches. Once flagged, Google will remove any potentially harmful information.

Google is also working on a new My Ad Center that will allow users to provide feedback about the ads they see while using various Google products. Users can remove specified types of adverts or indicate that they want to see more ads about a specific topic. 

Overall, users will be able to control what ads they see a lot better. In the Ads Privacy settings, they can now select which brands you want to see more or less of. This feature applies to YouTube, Search and Discover feed, where it will also be possible to block and report unwanted adverts.

The Verge:    Mobile Syrup:     ZDNet:     Oodlaoop:      Times of India:  

You Might Also Read: 

Google Plans To Eradicate Cookies:

 

« British Cyber Security At Risk From Russia
Why Data Storage Is the Number One Cyber Recovery Strategy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

BlackBerry Cybersecurity

BlackBerry Cybersecurity

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

Fairfirst Insurance

Fairfirst Insurance

Fairfirst Cyber Insurance protects your business assets against the complexity of cyber threats.

Axxum Technologies

Axxum Technologies

Axxum Technologies is a premier provider of Network Communications and Information Technology Security Solutions.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.

OneCollab

OneCollab

OneCollab, your unwavering ally in the dynamic landscape of IT services and cybersecurity.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.