Thursday, March 28, 2024

Google Started Rolling out Incognito Mode in Maps to Enhance User Privacy

Google rolls out Incognito Mode for Google maps to enhance user privacy. The Incognito was first introduced in Google chrome in 2008.

The Incognito Mode is the optional Chrome feature that lets you browse in private mode and to stop websites tracking your activities.

Earlier this year incognito mode was introduced for YouTube, by watching videos in incognito it will not get reflected or influenced in your watch history.

Privacy Enhancements

By having Incognito Mode enabled for maps, the map activity associated with the device will not be saved to Google account and the activity won’t be used by Google for personalizations and suggestions.

Incognito Mode in Map

Last May Google announced auto-delete feature for Location History and web activity data, with this option you can select how long the data to be stored ranging between 3 or 18 months or you can delete the data manually anytime.

Now this auto-delete feature comes to YouTube, now with Youtube you can choose how long to store the data.

Auto-delete Youtube

With the recent Chrome update, Google fixed a loophole that allows websites to detect user activity.

Also, Google to add new features to control your data with the voice assistant, you can delete your assistant activity from Google account using voice commands such as “Hey Google, delete the last thing I said to you” or “Hey Google, delete everything I said to you last week.”

The tools like security checkup which shows the devices used to access the account, Recent security events, Sign-in & recovery and Third-party access to the account.

Password Checkup is another tool that check’s your stored password strength, if you use a weak password, compromised one or re-used the password it will through an alert.

How to Enable Incognito Mode Maps

Enabling and disabling Incognito Mode in maps a simple process once enabled none of the data will be stored in the Google account.

Enable Incognito Mode Maps

  1. Open the Google Map

  2. Tap on your Photo

  3. Select Turn on Incognito mode

  4. Map loads under Incognito mode

Google started rolling out the Incognito Mode Maps in this month for Android devices and it will be available soon for iOS devices.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles