• California Consumer Privacy Act (CCPA)
  • Contact us
  • Cookie Privacy Policy
  • Privacy Policy
  • Terms of Use
News Net Daily
  • Business
  • politics
  • sports
  • USA
  • World News
    • Tech
    • Entertainment
    • Health
  • Contact us
No Result
View All Result
  • Business
  • politics
  • sports
  • USA
  • World News
    • Tech
    • Entertainment
    • Health
  • Contact us
No Result
View All Result
News Net Daily
No Result
View All Result

Google Gmail upgrade – why you need this new email address

remon Buul by remon Buul
May 27, 2025
in Tech
0
Google Gmail upgrade – why you need this new email address

You must change the way you use Gmail.

DPA / Alliance Picture via Getty Images

Republished on May 27 with new reports on e-mail attacks and a useful safety test to see tactics that are now used against them.

The 2 billion Google Gmail users have a critical decision to make. But Google too. And the technology giant could be the most critical. The latest Gmail upgrade gives Gemini a free reign on all your past emails and even your stored files. If you leave it. This is the decision you need to make. As for Google, he sits on a critical decision of a different type.

“Gmail obtains personalized intelligent responses that incorporate your context and tone,” Google confirmed last week. “REPPARIES will sound authentically like you and correspond to your typical tone, because the answers are created from previous emails and reader files.”

But as I already warned it“We are still in the early stages of these changes, and we do not yet have an idea of ​​the risks of confidentiality and security.” There is also an awkward disconnection: The recent upgrading of Gmail encryption comes up against its IA upgrades.

What Gmail users really need is the Ode of Google to the Apple Hidemyemail. What “is a service that allows you to keep your private personal email address, whether you create a new account with an application, which you register for an online newsletter, whether you make a purchase with Apple Pay or send an email to someone you don’t know well.”

ForbesThe FBI wants access to iPhone and Android encrypted data – the same goes for EuropeBy Zak Doffman

For iPhone users, it has been described as “The best Apple product you don’t use. “Spam is out of control despite hunting and filtering the AI, the problem remains.

By Comment This weekend, “I seem to receive emails almost every week by informing myself that one of my online accounts has been part of a data violation … This is why the use of a service such as Hide My Email is more important than ever.”

It’s good for iPhone and Apple Mail, but what about Android and Gmail? There is a solution. Revealed for the first time last November, Android Armored e-mail The functionality does the same as Hidemyemail. At the end of February, Android authority revealed the details of the new feature following an APK Services disassembly.

The armored emails “will be part of Google’s firefighter system. Simply think about all applications or screens where Google appears with its suggested details on the automatic according to your passwords and saved user names; All these elements should be the new house for armored emails. ”

When the team “tried to register for Amazon”, he saw that “Gboard’s smart update bar not only suggested the usual e-mail address that we know that we usually use, but also a new protected email option.” It is not yet live and has therefore not worked. It will require integration on the messaging server side in case of type. But it is clearly in development at an advanced stage.

The big titles that still circulate after Jeremy Fowler de Vpnmentor discovered an exposed data violation “184 million connections and passwords“The need for a protected email that is really used – and HideMyemail which is really used – has never been larger.” I saw thousands of files that included emails, user names, passwords and URL links to connection or account authorization. “This included” bank and financial accounts, health platforms and government portals from many countries “.

ForbesGoogle Chrome Warning – Do not use any website on this listBy Zak Doffman

The masking of email addresses makes it more difficult for attackers to reference your data and passwords and to socially attack attacks on your name. It allows you to deactivate compromise email addresses. In tandem with solid and unique passwords and two factors authentication (2FA), or ideally Passkeys, it advances the doors in your life now wide.

One of the most critical weaknesses in email is your address acting as the main identifier of so many accounts. If this is hidden, you probably cannot be followed on the sites. But if you don’t use it, none of this matters. So, while Google must decide its version, when it comes, you need to use new addresses for all the new platforms you use.

With a perfect timing, coming just after the new Gmail AI announcements from Google, Android authority Provides a different perspective, with a “survey (which) shows that Gmail users would gladly sacrifice the functionality for more confidentiality … Confidentiality seems to become a larger matter each year because a growing number of people are not cool with their data becoming a commodity. Proton Mail claims to offer more confidentiality than Gmail – Without Google application, even the Proton team cannot throw a boost on your confidentiality box. To find out, they questioned their readers.

The results are interesting. “About 73% of you have said that you would use Proton Mail instead of Gmail, with more than half of these people saying that they would even pay it. Less than 27% of you said that you were satisfied with Gmail.” I suspect that it would be very different in a larger base, but it highlights the current Gmail tension that has been highlighted by Google announcing Gemini can now access all your past emails and even Google Drive To better imitate your style and tone. In the world of confidentiality, this is certainly what you call a moment of fall in microphone.

As Mag PC I warned “I gave gemini access to my gmail, and that does me.” And although this focuses on unexpected results, “Google collects a variety of information when you use Gemini, which includes all of your cat history. The company uses this information to improve its products and train its important language models. However, Google does not use Gemini data from Google workspace applications, but I don’t really trust Google, for training, training,

ForbesMicrosoft tells almost all Windows users – you must restart your PCBy Zak Doffman

All of this simply reflects the e-mail identity crisis. How does he improve secure APE messaging platforms while remaining an open standard? Can it secure the content while acting as a workshop window for AI innovations based on the cloud? And the imminent tidal wave of phishing attacks and malicious software supplied by AI will it never be at a distance?

It is not only Gmail, of course, which is now at risk given the use of email as a main identifier and a way to fight against phishing attacks, then to reference the identification information that is returned. By Cybersecurity news“A sophisticated phishing campaign (SI) targeting Italian and American users via the False Microsoft Onenote Connection Prompts designed to harvest Office 365 and Outlook Credentials.”

In this new attack, “the victims receive emails with subject lines such as” a new document shared with you “, directing them towards false OneNote pages which seem legitimate. The malicious pages have several authentication options, including Office365, Outlook, Rackspace, ARUBA Mail, PEC and other messaging services. ”

And with regard to documents, few brands have been more imitated in recent phishing attacks than Docusign, where the main direct is based on email. Eset warn that “the victims will generally receive an email with a Docusign Usurpé envelope asking them to click on a large yellow box to” revise the document “.

Sometimes the malicious link is hidden behind a QR code in the attachment. But the objective is the same, to direct users to a false connection page for their messaging services, which will steal their identification information and, potentially even, will even bypass two factors.

As Dowelly Underlines that AI changes the situation for such attacks by email and accelerated the need for users to modify the parameters of their account, their behavior and the e-mail addresses that they give much more freely than mobile phone numbers. “Sophisticated phishing attacks are more difficult to detect by nature,” says the company, “and sometimes even cautious users can always fall into the trap.”

Deloitte says that email users are now experiencing “infobesity” through their received emails, which makes them less cautious to detect phishing attempts. Cybercriminals are ingenious during user deception by manufacturing content and escaping detection models (content customization, copy of the graphic charter, etc.). Cybercriminals also take advantage of the information that users share on themselves via social media, to create custom and more authentic messaging models. “”

ForbesDo not join any meeting on your PC if you see this messageBy Zak Doffman

“Phishing attacks are trying to encourage users without distrust to reveal personal or financial information,” says Google, “often by imitating the content of well -known and confidence companies. AI already makes phishing attacks more sophisticated, personalized and common. Think that you can say what is real or false?” You might be surprised. You can put yourself to the test with Google Phishing quizwhich imitates many of the tactics used today. See how you are going.

Deloitte warns that “many users are simply not sufficiently skeptical when it comes to receiving requests to do things such as transfer of funds, open attachments or provide sensitive information.

All these attacks start with an email address. By Expressvpn“With so many online platforms requiring email addresses, tools such as armored emails aim to respond to growing concerns about confidentiality and data security. The alias e-mail also allow users to trace which services could share their information.”

E -mail needs a rethink. And in the meantime, your account also needs a rethink. Use the new armored e-mail feature as it becomes available, but also think about the consequent longevity and vulnerability of the e-mail address you use today, the main identifier that stimulates all these attacks. It may be time to open a new account and slowly go from the old to the new, leaving the luggage behind.

Previous Post

Adidas says that customer data has been stolen in cyber attack

Next Post

Nasdaq, S&P Arare more than 2% each on positive commercial developments, consumer confidence (DJI: Dow Jones Indices)

Next Post
Nasdaq, S&P Arare more than 2% each on positive commercial developments, consumer confidence (DJI: Dow Jones Indices)

Nasdaq, S&P Arare more than 2% each on positive commercial developments, consumer confidence (DJI: Dow Jones Indices)

  • Home
  • Contact us
  • Cookie Privacy Policy
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Business
  • politics
  • sports
  • USA
  • World News
    • Tech
    • Entertainment
    • Health
  • Contact us

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.