Friday, April 11, 2025
HomeCyber Security NewsGoogle Using Gmail to Read Your Online Purchase Invoice Data to track...

Google Using Gmail to Read Your Online Purchase Invoice Data to track your Purchase History

Published on

SIEM as a Service

Follow Us on Google News

Google tracks every single purchase that you have made online in years if you have the receipts sent to your personal Gmail account.

The purchase records can be accessed through a page called Purchases, which shows a list of products that you have purchased using online services such as Amazon, Flipkart, Swiggy, and more.

Years before Google said they would stop collecting data through Gmail for ad targeting purchases, but according to the CNBC report, Google is still collecting much personal information behind the scenes.

- Advertisement - Google News

If you have the invoices received through your Gmail account and then it extracts the information to list the products that you have purchased.

List of Purchases

When I have checked my account purchases, the above list contains all the purchases that I have made from Swiggy, Flipkart, Amazon, and more.

“To help you quickly view and keep track of your purchases, bookings, and subscriptions in one place, we’ve created a private destination that can only be seen by you. You can delete this information at any time. We don’t use any information from your Gmail messages to serve you ads, and that includes the email receipts and confirmations shown on the Purchase page,” said Google Spokesperson.

However, deleting the data is not simple; there are no options to select and delete all the data at once; you should go deleting one by one.

If you want to remove purchase, then need to open the particular purchase, and there you can “Remove Purchase” option, click on that shows a popup with option view Email, which takes you to the Email containing the receipt.

Gmail

You need to delete the Email and then to remove the Email trash, to get the purchase removed from the list.

To check further, we placed an order in Swiggy, once the payment completed, Swiggy sends a receipt for order confirmation, once the Email received in Inbox, we can the order appears in the purchase list with status Accepted.

Gmail

Once the order got delivered, a delivery confirmation email arrived from Swiggy, after that the status in the payment page changed from Accepted to completed. The service instantly reads the Email receipt and update the status.

Gmail

It is still unclear why Google is pulling all the information and dumping them to purchases; the page doesn’t know by most of the people, “Google says it’s looking into simplifying its settings to make them easier to control.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Hackers Hosting Malware On Google Sites To Steal Data and Share It to the Remote Server

Hackers Nearby can Hijack Bluetooth Titan Security Keys – Google Replacing it for Free

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further...

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral...

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers,...

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further...

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral...

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers,...