Google using its clout to widen use of encryption

Aug 07, 2014

Google is wielding the power of its dominant Internet search to push more websites into protecting the people using their services.

The move announced late Wednesday involves a change in Google's closely guarded formula for determining the rankings of its .

Websites that automatically encrypt their services will now be boosted higher in Google Inc.'s recommendation system. For now, encryption will remain a small factor in Google's ranking formula, but the Mountain View, California says it may put greater emphasis on the security measure in the future as part of its campaign to make it tougher for government spies and computer hackers to grab the of unwitting Web surfers.

Users can tell if a website is encrypted if its address begins with "https."

Explore further: Google steps up bid to stymie email snooping

5 /5 (2 votes)
add to favorites email to friend print save as pdf

Related Stories

Google steps up bid to stymie email snooping

Jun 04, 2014

Google stepped up its effort Wednesday to make it tougher for spies or anyone else to snoop on email, unveiling Chrome browser software for scrambling digital messages.

Recommended for you

Yelp to pay US fine for child privacy violation

6 hours ago

Online ratings operator Yelp agreed to pay $450,000 to settle US charges that it illegally collected data on children, in violation of privacy laws, officials said Wednesday.

A Closer Look: Your (online) life after death

Sep 16, 2014

Sure, you have a lot to do today—laundry, bills, dinner—but it's never too early to start planning for your digital afterlife, the fate of your numerous online accounts once you shed this mortal coil.

Web filter lifts block on gay sites

Sep 16, 2014

A popular online safe-search filter is ending its practice of blocking links to mainstream gay and lesbian advocacy groups for users hoping to avoid obscene sites.

Protecting infrastructure with smarter CPS

Sep 16, 2014

Security of IT networks is continually being improved to protect against malicious hackers. Yet when IT networks interface with infrastructures such as water and electric systems to provide monitoring and control capabilities, ...

User comments : 0