Support Tech Teacher Help keep our digital safety guides free for seniors and non technical learners. Click to hide this message

Tech Teacher is a small nonprofit. We do not run ads or sell data. Your donation helps us:

  • Offer free cybersecurity guides for seniors
  • Run workshops for underserved communities
  • Explain technology in simple, clear language
Donate with PayPal Even 3 to 5 dollars helps us reach more people.

Smashing Security podcast 448: Google kills off old accounts, and a cyberstalking tool – January 2026

Author/Source: Graham Cluley See the full link here

Takeaway

This article discusses important updates in online security. It explains Google’s plan to delete old accounts, introduces a problematic tracking tool called WebDetetive, and talks about changes to UK laws regarding computer misuse. Readers will learn about these key security topics and their potential impact.


Technical Subject Understandability

Beginner


Analogy/Comparison

Managing your old online accounts is like cleaning out an old closet you haven’t opened in years, where you decide what to keep and what to throw away to avoid clutter and potential problems.


Why It Matters

It matters because keeping old, unused online accounts can be a security risk; if they get hacked, criminals could use them to access your other personal information. For example, Google is deleting inactive accounts to prevent them from being easily taken over and used for scams. Also, tools like WebDetetive highlight how easily someone can secretly track another person’s phone activities, which raises serious privacy concerns.


Related Terms

Inactive accounts, WebDetetive, Computer Misuse Act. Jargon Conversion: Inactive accounts are online accounts that people haven’t logged into or used for a long time. WebDetetive is a computer program that lets someone secretly watch what another person is doing on their phone. The Computer Misuse Act is a British law that makes it illegal to do certain things with computers without permission, like breaking into someone else’s computer.

Leave a comment