Yandex began indexing personal data from Google Docs

10.07.18 в 12:35 Interesting 15726

On July 4, Yandex users paid attention to the beginning of indexing by the search engine of documents Google Docs, where there was personal information (corporate information, information about passwords and credit card data). The problem was quickly resolved, and already at 1 am on Thursday, the information again became inaccessible to ordinary users.

Why did this happen?

Formally, the search engine refers to the incorrect settings of privacy by the users themselves, but it is unlikely that the owners of such documents have discovered random access to valuable personal information and sent someone a link.

Among the experts, there is an opinion that the reason for the information coming out could be the use of Yandex.Browser or the forwarding of links through the mail of the largest Russian search engine, which were automatically indexed, and information accidentally fell into the general access. In any case, in 2015 it turned out that the proprietary browser automatically transmitted information about the visited pages to the Yandex server. The latter were included in the database of the search robot, which was able to enter into separate user profiles without entering a password. Then the management of Yandex reported that such a practice would be terminated.

What should the user do?

Short-term entry into the search engines of private information can potentially threaten legal and natural persons because of the opportunity to use it for personal gain. This in an interview with "360" said one of the heads of advertising agencies, which in Google Docs stores all important information.

For our part, we recommend that users refuse to store valuable information on the Internet on cloud services and, in a mandatory manner, additionally control the privacy settings.

Comments

Sign in to comment
Popular

Together with wide opportunities the Internet carries a number of dangers. First of all, when it comes to anonymity and security.

Initially, the World Wide Web was conceived as a space without borders, where you can get absolutely any information on an anonymous basis.

In today's world, it becomes more difficult to keep personal and corporate data in secret, so the issue of information security is becoming more acute every day.

In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our country

New

This type of proxy has specific features that you need to keep in mind when working with it. Understanding these principles makes it possible for you to predict its performance and confidently incorporate proxy server in your project

Proxy traffic can also be encrypted, just like a VPN. The TLS over Proxy technology is used for this purpose! You can read about how this works and why such proxies can be more convenient and efficient than VPN services in this article

Mobile proxy is a software and hardware complex that acts as an intermediary between the user and the Internet. The proxy function is to receive a signal from the device, assign a new IP address, and transmit it to the global network. As a result, the user uses one IP, and the Internet connection comes from a completely different one

In this article we'll talk about TOR and its place in ensuring anonymity on the Internet, and how to use Tor Browsers on Windows 10 and Android.

Not every place on the Internet is easily accessible nowadays. Many websites get blocked or they set restrictions on their visitors themselves. So how to retain access to the content you need? We'll explain it in this article.

Have you got any question?

Click here and we’ll answer