Falcon Searches Through Browser History

October 21, 2016

Have you ever visited a Web site and then lost the address or could not find a particular section on it?  You know that the page exists, but no matter how often you use an advanced search feature or scour through your browser history it cannot be found.  If you use Google Chrome as your main browser than there is a solution, says GHacks in the article, “Falcon: Full-Text history Search For Chrome.”

Falcon is a Google Chrome extension that adds full-text history search to a browser.  Chrome usually remembers Web sites and their extensions when you type them into the address bar.  The Falcon extension augments the default behavior to match text found on previously visited Web Sites.

Falcon is a search option within a search feature:

The main advantage of Falcon over Chrome’s default way of returning results is that it may provide you with better results.  If the title or URL of a page don’t contain the keyword you entered in the address bar, it won’t be displayed by Chrome as a suggestion even if the page is full of that keyword. With Falcon, that page may be returned as well in the suggestions.

The new Chrome extension acts as a delimiter to recorded Web history and improves a user’s search experience so they do not have to sift through results individually.

Whitney Grace, October 21, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Microsoft Looks Slightly Desperate Paying People to Use Edge and Bing

September 28, 2016

The article on Business Insider titled Microsoft Will Actually Pay You to Use Its Newest Web Browser shows the evolution of Microsoft’s program from using Bing Rewards to their own Microsoft Rewards. Originally, just using Bing could earn users points towards Starbucks, Amazon, and Hulu, to name a few. Microsoft is now rebranding and expanding the program to incentivize users to spend time on Microsoft Edge, the child of Internet Explorer. The article states,

So long as you’re actively using Microsoft Edge — defined as having the Edge window open and actually using it to browse the web…— you’ll accrue points that can be redeemed for prizes, up to 30 hours’ worth a month. While Windows 10 is on over 350 million active devices, the Edge browser hasn’t quite made the splash that Microsoft had hoped for. Current numbers place Edge usage at just over 4.2% of the overall browser market.

The article makes a point of mentioning that for this program to work for users, they can’t just have Microsoft Edge open. They also must use Microsoft Bing as their default search engine. Without that setup, no points for you. Some users might jump at the chance to get paid for doing practically nothing, but others might be less than willing to expose themselves to being tracked by Microsoft. Still others might wince at the idea of giving up their Google default. Microsoft Edge: the broke person’s Google Chrome.

Chelsea Kerwin, September 28, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google vs. Europe Becomes Three-Front War

September 2, 2016

The article titled European Commission Files Third Antitrust Charge Against Google on The Guardian discusses the most recent accusation against Google by the European Commission. This time, they took aim at AdSense advertising. The antitrust commissioner Margrethe Vestager announced that Google is preventing the visibility of competitors and favoring its own shopping service as well. The article states,

The EU regulator accuses Alphabet’s Google of abusing its dominance in search to benefit its own advertising business, which has historically been the company’s main revenue stream. The EC also reinforced its existing charge against Google’s shopping service…The EU’s concerns around Google’s adverts relate to the company’s AdSense for Search platform, in which Google acts as an intermediary for websites such as those of online retailers, telecoms operators or newspapers, with searches producing results that include search ads.

Alphabet’s Google has been given 10 weeks to answer the commission’s statement of objections. If the company is found guilty, its fines will consist of up to 10% of its global turnover. While Google works on its response to the charges, another investigation by the EU continues. The latter involves Google’s preferential treatment of its own products such as Google Chrome through its Android system.

Chelsea Kerwin, September 2, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

New Security Service Enters Consumer Space

April 29, 2016

It looks like another company is entering the arena of consumer cybersecurity. An article from Life Hacker, Privacy Lets You Create “Virtual” Credit Card Numbers, Deactivate One Instantly If It’s Stolen, shares the details of Privacy. Their tool generates disposable card numbers online, which can be tied to accounts with participating banks or Visa cards, and then allows users to easily deactivate if one is stolen. The service is free to users because Privacy makes money acting as a credit card processor. The article tells us,

“Privacy just gives you the ability to create virtual “accounts” that are authorized to charge a given amount to your account. You can set that account to be single use or multi-use, and if the amount is used up, then the transaction doesn’t go through to your main account. If one of your virtual accounts gets hit with an account you don’t recognize, you’ll be able to open the account from the Privacy Chrome or Firefox extension and shut it down immediately. The Chrome extension lets you manage your account quickly, auto-fill shopping sites with your virtual account numbers, or quickly create or shut down numbers.”

We think the concept of Privacy and the existence of such a service points to the perception consumers find security measures increasingly important. However, why trust Privacy? We’re not testing this idea, but perhaps Privacy is suited for Dark Web activity.

 

Megan Feil, April 29, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Paywalls Block Pleasure Reading

April 4, 2016

Have you noticed something new in the past few months on news Web sites?  You click on an interesting article and are halfway though reading it when a pop-up banner blocks out the screen.  The only way to continue reading is to enter your email, find the elusive X icon, or purchase a subscription.  Ghacks.net tells us to expect more of these in, “Read Articles Behind Paywalls By Masquerading As Googlebot.”

Big new sites such as the Financial Times, The New York Times, The Washington Post, and The Wall Street Journal are now experimenting with the paywall to work around users’ ad blockers.  The downside is that content will be locked up and sites might lose viewers, but that might be a risk they are willing to take to earn a bigger profit.

There used be some tricks to get around paywalls:

“It is no secret that news sites allow access to news aggregators and search engines. If you check Google News or Search for instance, you will find articles from sites with paywalls listed there.  In the past, news sites allowed access to visitors coming from major news aggregators such as Reddit, Digg or Slashdot, but that practice seems to be as good as dead nowadays.  Another trick, to paste the article title into a search engine to read the cached story on it directly, does not seem to work properly anymore as well as articles on sites with paywalls are not usually cached anymore.”

The best way, the article says, is to make the Web site think you are a Googlebot.  Web sites allow Googlebots roam freely to appear higher in search engine results.  There are a few ways to trick the Web sites into thinking you are a Googlebot based on your Internet browser, Firefox or Chrome.  Check them out, but it will not be long before those become old-fashioned too.

 

Whitney Grace, April 4, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Reveals Personal Data in Search Results

March 30, 2016

Our lives are already all over the Internet, but Google recently unleashed a new feature that takes it to a new level.  Search Engine Watch tells us about, “Google Shows Personal Data Within Search Results, Tests ‘Recent Purchases’ Feature” and the new way to see your Internet purchases.

Google pulls the purchase information most likely from Gmail or Chrome.   The official explanation is that Google search is now more personalized, because it does pull information from Google apps:

“You can search for information from other Google products you use, like Gmail, Google Calendar, and Google+. For example, you can search for information about your upcoming flights, restaurant reservations, or appointments.”

Personalized Google search can display results now only from purchases but also bills, flights, reservations, packages, events, and Google Photos.  It is part of Google’s mission to not only organize the world, but also be a personal assistant, part of the new Google Now.

While it is a useful tool to understand your personal habits, organize information, and interact with data like in a science-fiction show, at the same time it is creepy being able to search your life with Google.  Some will relish in the idea of having their lives organized at their fingertips, but others will feel like the NSA or even Dark Web predators will hack into their lives.

 

Whitney Grace, March 30, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Search Experts Looking for Work? Rejoice

November 23, 2015

The article titled 17 Tools to Make LinkedIn Work for You on TNW provides some thoughtful commentary on how to make the best use of the social media platform LinkedIn. The article begins by emphasizing how important and relevant LinkedIn still is, particularly for people in Sales, who use the service to gather information and research prospects. It goes on to highlight the difficulty facing salespeople when it comes to searching LinkedIn, and the myriad of tools and Chrome extensions available to simplify search. The first on the list is Crystal,

“Language matters. How you communicate with someone, the words you use, how you structure your requests etc. affects their initial perception of you. And that’s what Crystal helps with. The standalone app as well as its Chrome extension allows you to profile Linkedin users profiles to detect their personality. And suggest the best ways to communicate with them. Crystal can tell you what to write in an email or how to create a message that engages them in a way they’d expect from you.”

Other resources include SalesLoft Prospector, which aids in building lists of targeted leads with contact information in tow, Elink.Club for LinkedIn, which visits 800 targeted profiles a day with the expectation that just under 10% of those users will, in turn, return the visit and become acquainted, and Discover.ly, which helps users establish mutual friends and social media commonalities with the profiles they view.

Chelsea Kerwin, November 23, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Search the Snowden Documents

July 16, 2015

This cat has long since forgotten what the inside of the bag looked like. Have you perused the documents that were released by Edward Snowden, beginning in 2013? A website simply titled “Snowden Doc Search” will let you do just that through a user-friendly search system. The project’s Description page states:

“The search is based upon the most complete archive of Snowden documents to date. It is meant to encourage users to explore the documents through its extensive filtering capabilities. While users are able to search specifically by title, description, document, document date, and release date, categories also allow filtering by agency, codeword, document topic, countries mentioned, SIGADS, classification, and countries shared with. Results contain not only full document text, pdf, and description, but also links to relevant articles and basic document data, such as codewords used and countries mentioned within the document.”

The result of teamwork between the Courage Foundation and Transparency Toolkit, the searchable site is built upon the document/ news story archive maintained by the Edward Snowden Defense Fund. The sites Description page also supplies links to the raw dataset and to Transparency Toolkit’s Github page, for anyone who would care to take a look. Just remember, “going incognito doesn’t hide your browsing from your employer, your internet service provider, or the websites you visit.” (Chrome)

Cynthia Murrell, July 16 , 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Chrome Restricts Extensions amid Security Threats

June 22, 2015

Despite efforts to maintain an open Internet, malware seems to be pushing online explorers into walled gardens, akin the old AOL setup. The trend is illustrated by a story at PandoDaily, “Security Trumps Ideology as Google Closes Off its Chrome Platform.” Beginning this July, Chrome users will only be able to download extensions for that browser  from the official Chrome Web Store. This change is on the heels of one made in March—apps submitted to Google’s Play Store must now pass a review. Extreme measures to combat an extreme problem with malicious software.

The company tried a middle-ground approach last year, when they imposed the our-store-only policy on all users except those using Chrome’s development build. The makers of malware, though, are adaptable creatures; they found a way to force users into the development channel, then slip in their pernicious extensions. Writer Nathanieo Mott welcomes the changes, given the realities:

“It’s hard to convince people that they should use open platforms that leave them vulnerable to attack. There are good reasons to support those platforms—like limiting the influence tech companies have on the world’s information and avoiding government backdoors—but those pale in comparison to everyday security concerns. Google seems to have realized this. The chaos of openness has been replaced by the order of closed-off systems, not because the company has abandoned its ideals, but because protecting consumers is more important than ideology.”

Better safe than sorry? Perhaps.

Cynthia Murrell, June 22, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google’s Corporate Sovereignty Is Not Confined to US

June 1, 2015

The article on The Daily Dot titled The United States of Google reacts to the information that Google now spends more on lobbying than any other company. This may not come as a huge surprise, but it does carry heavy implications about the power and affluence of the country- er, company. This explains a great deal of the tension that Google faces in Europe, where competition is more favorable than monopoly. The article refers to the event in 2010 of Google leaving its partnership with China after controversy over censorship. The article explains,

In one sense, this was a righteous step for Google, demonstrating that they knew how to put its foot down in the face of toxic regimes. But in another sense, it was a scary moment, too. After all, do we really want Google to be more effective than the U.S. itself when it comes to dealing with tyrants?…  “Does Google have more direct impact on human rights and freedoms in China than the Obama Administration?”

The article goes on to discuss what “Googlestan” might look like in a very lighthearted yet ominous tone. The ubiquity of Google is at the center of the concern- who can get through a day without relying on some aspect of Google’s services, from Gmail to Chrome to search? By becoming so dependent on a company as individuals, a nation and perhaps even a world, have we created a monster?

Chelsea Kerwin, June 1, 2014

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Next Page »

  • Archives

  • Recent Posts

  • Meta