Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Cloud Computing
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
All Gmail Traffic Now Fully Encrypted, Google Says
All Gmail Traffic Now Fully Encrypted, Google Says

By Adam Dickter
March 21, 2014 12:11PM

    Bookmark and Share
"Today's change means that no one can listen in on your messages as they go back and forth between you and Gmail's servers -- no matter if you're using public Wi-Fi or logging in from your computer, phone or tablet," said Nicolas Lidzborski, Google's Gmail security engineering lead, in a post on the company's official blog.
 



All messages through Google's e-mail service will be encrypted to protect the privacy of senders and recipients, the technology giant announced this week.

Google didn't mention the National Security Agency or increasing concern about government monitoring of civilian communication and Internet use, but the announcement of automatic HTTP encryption is likely a response to recent revelations by major media organizations about U.S. domestic spying efforts.

Safe Transit

"This ensures that your messages are safe not only when they move between you and Gmail's servers, but also as they move between Google's data centers -- something we made a top priority after last summer's revelations," said Nicolas Lidzborski, Google's Gmail security engineering lead, in a post on the company's official blog Thursday.

The New York Times in August reported that the NSA had access to "vast amounts" of Americans' e-mails and other communications, such as text messages, and routinely searched for keywords that might provide links to terrorists. Thus it would not only affect those who might have been communicating with people on government watch lists but even those who cited names and other information. The revelations came about as an apparent result of information leaked by former NSA contract employee Edward Snowden.

Hypertext Transfer Protocol Secure, or HTTPS, is a method that increases security by layering one type of protocol over another and is effective against so-called man-in-the-middle attacks because it authenticates Web sites and servers.

Lidzborksi's blog post noted the progressive level of encryption used by Google in the last few years. "Gmail has supported HTTPS since the day it launched, and in 2010 we made HTTPS the default," he wrote.

"Today's change means that no one can listen in on your messages as they go back and forth between you and Gmail's servers -- no matter if you're using public Wi-Fi or logging in from your computer, phone or tablet."

Google was one of the first first free e-mail providers to offer HTTPS encryption, notes Chester Wisniewski, a Canada-based senior adviser at Sophos, a cyber-security firm. "It's great that it is now being utilized for all users," he told us. But he cautioned that it is not a magic bullet.

"People must remember that this does not protect their actual e-mail messages though, it only encrypts the messages between them and Google," Wisniewski said. "The e-mails are still stored and transferred in clear text more often than not."

Take Precautions

Google recommends additional security precautions in its blog post, such as creating strong passwords and enabling two-step verification. More hints are available at Google's Security Center.

Yahoo announced last November that it also would encrypt all e-mail as well as customer data from other services by this summer.

"Yahoo has never given access to our data centers to the NSA or to any other government agency," wrote president and CEO Marissa Mayer, in a statement at the time. "Ever. There is nothing more important to us than protecting our users' privacy."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Cloud Computing
1.   Oracle To Buy TOA Technologies
2.   Oracle Releases a Slew of Upgrades
3.   Cloud Wars: AWS vs. Microsoft, IBM
4.   Yammer Moved to Office 365
5.   IBM, California Partner in the Cloud


advertisement
Amazon Intros Zocalo Storage Service
Online storage and sharing for business.
Average Rating:
Avaya Pressing Hard on Cloud-Based UC
Provides easier, faster provisioning.
Average Rating:
Cisco Woos More Devs with DevNet
To create new network-aware apps.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
New 'Backoff' Malware Slips Undetected into Retail Systems
'Malicious actors' are using a new variety of malware to access consumer payment data remotely through point-of-sale systems, according to a report from the Department of Homeland Security.
 
IBM Beefs Up Identity Intelligence Security Solutions
Big Blue is betting big on identity intelligence. IBM just acquired a private firm with security software to govern user access to apps and data across cloud and on-premise environments.
 
USB Security Flaw Lets Hackers Hijack PCs
Hackers can use the firmware that controls USB functions to take control of computers, say security experts. That means there may be a new class of attack for which there are no defenses.
 

Enterprise Hardware Spotlight
AMD's ARM-Based Opteron Out in $3K Dev Kit
It's dubbed "Seattle" and it's AMD's first 64-bit ARM-based Opteron processor. The low-power chip is being released as part of AMD’s Opteron A1100-series developer kit, and aimed at high-end data center needs.
 
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 

Mobile Technology Spotlight
Virgin Mobile Offers Custom Smartphone Plans
As the wireless carrier wars continue heating up, Virgin Mobile just threw the customization coal onto the fire. The firm has debuted a no-annual-contract plan with rates based on individual use.
 
Collaboration Provider Asana Revamps Mobile App
Asana, a collaboration software provider started by a Facebook founder, is now out with a rebuilt native iOS mobile app. It replaces one that even the company admits was not up to par.
 
FTC Wants Fix for 'Perfect Scam' of Mobile Cramming
The U.S. Federal Trade Commission has issued new guidelines to curb “mobile cramming,” a troublesome practice that adds unauthorized third-party charges to mobile phone bills.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.