Google Faces EU Monopoly Law Over Android Dominance

Google has been issued formal antitrust charges over claims that it abuses the dominant position of its Android operating system.

The European Commission (EC) sent a statement of objections to the tech firm, alleging that it has breached EU competition law. Google is accused of placing onerous requirements on firms using Android and stifling competition.

It said Android was "good for competition and good for consumers". Kent Walker, Google's senior vice president and general counsel, said: "Android has helped foster a remarkable and, importantly, sustainable ecosystem, based on open-source software and open innovation. We look forward to working with the European Commission."

The initial complaints from rivals were lodged with the commission in 2009. However, many of the companies that complained said, they had been adversely affected by Google's search algorithms for years beforehand. A formal investigation began in 2010.

The initial complaints were all about comparison shopping, looking for the best price for goods across different websites. The commission alleges that when people do a shopping search, the results they get back are weighted towards Google's services even if those results are not the most relevant.

Competition commissioner Margrethe Vestager said the matter could set a precedent for the way it judged other complaints about Google. The watchdog said she was also considering investigating Google's conduct when people searched for hotels and flights, and got maps in their results.
The commission has also received complaints about how Google scrapes websites and uses the content it finds and on how it works with its advertising partners.

Ms. Vestager also announced her team had launched a separate investigation into Google's mobile operating system Android.

She said the commission was concerned that Google was abusing its dominance in the smartphone and tablet market to give its own services, such as search, more prominence.

BBC: http://bbc.in/1VE92RB & http://bbc.in/1rqdQhp

« Snowden On Police Chasing Journalist’s Data
Russia Blamed For Swedish Air Traffic Hack »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Secunet Security Networks

Secunet Security Networks

Secunet is a leading cyber security company offering a combination of consultancy and products, delivering the highest level of security for data, applications and digital identities.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Aptible

Aptible

Aptible is a Platform as a Service (PaaS) that gives startups everything developers need to launch and scale apps and databases that are secure, reliable, and compliant.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

FastNetMon

FastNetMon

FastNetMon is a very high performance DDoS detection and mitigation tool which could detect malicious traffic in your network and immediately block it.

Immunefi

Immunefi

Immunefi provides bug bounty hosting, consultation, and program management services to blockchain and smart contract projects.

Safe Decision

Safe Decision

Safe Decision is an information technology company offering Cyber Security, Network, and Infrastructure Services and Solutions.

CipherStash

CipherStash

CipherStash is a complete data governance and breach prevention platform.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.

8kSec

8kSec

8kSec is a cybersecurity company specializing in training, consulting, and research.