• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google maps timeline data to be stored locally on your

Google Maps Timeline Data to be Stored Locally on Your Device for Privacy

You are here: Home / General Cyber Security News / Google Maps Timeline Data to be Stored Locally on Your Device for Privacy
June 6, 2024

Google has announced plans to shop Maps Timeline knowledge domestically on users’ products in its place of their Google account efficient December 1, 2024.

The alterations have been at first announced by the tech giant in December 2023, together with variations to the car-delete control when enabling Locale Heritage by placing it to three months by default, down from the prior restrict of 18 months.

Google Maps Timeline, as the name indicates, helps consumers observe routes, outings, and destinations they have been to in excess of time, assuming Location Background and Web & Application Exercise settings are enabled.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


But with the hottest adjust to host the knowledge on users’ equipment, the company has also mentioned that it’s eradicating the capacity to see them on the web.

“Given that the info revealed on your Timeline comes specifically from your device, Timeline will not be offered on Maps on your laptop following your info is moved to your phone,” Google observed in a support document.

The updates, it additional, are step by step rolling out to all end users of the Google Maps application. Consumers are also becoming asked to flip on backups to help you save an encrypted copy of the Timeline information on Google’s servers to aid transfer when switching equipment.

Cybersecurity

The advancement is element of a collection of modifications the corporation has enacted in response to allegations that the enterprise misled customers and illegally tracked their movements inspite of turning off Spot Record from the account options by taking gain of the non-noticeable Web & Application Activity location.

“Leaving ‘Web & App Activity’ on and turning ‘Location History’ off only stops Google from introducing your actions to the ‘timeline,’ its visualization of your every day travels,” an Involved Press investigation unveiled in 2018. “It does not quit Google’s selection of other locale markers.”

Google has due to the fact settled with a number of states in the U.S. about this practice, with the enterprise also opting to fork out $62 million to a lot of non-earnings in April 2024. A related lawsuit filed in the state of Texas is pending.

Uncovered this article attention-grabbing? Comply with us on Twitter  and LinkedIn to go through additional exceptional information we submit.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «hackers target python developers with fake "crytic compilers" package on pypi Hackers Target Python Developers with Fake “Crytic-Compilers” Package on PyPI
Next Post: Hackers Exploit Legitimate Packer Software to Spread Malware Undetected hackers exploit legitimate packer software to spread malware undetected»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.