End of iTunes – Apple Announced

End of iTunes
iTunes Logo

After 2 decades – Apple is terminating iTunes. Its the End of iTunes a historic announcement made by Apple.

These past few weeks, rumours circulating around the online streaming world about Apple ending iTunes App. This started when people on social media started to notice that Apple iTunes have taken out all their posts on their official Facebook page, which was reportedly happened in less than 24 hours, since some followers were able to check some posts on May 31, 2019 on their page and eventually all posts have been removed later that day.

Posts, photos and videos were also taken out on their official Instagram account on the same timeline. Now, that fed up the speculations about Apple is terminating the iTunes app. With this, it has been reported that posts, photos and videos of the iTunes official Facebook page were transferred to its Apple TV official Facebook page. In fact, according to iconfactory.com, some of itunes.apple.com links for songs and artists are now being redirected to music.apple.com, enough proof to safely say that Apple is gearing away from its two decade app.

A little bit of History until the End of iTunes

Apple iTunes has been around for 18 long years, it was introduced last January of 2001. This media management software is design to play, download and organize digital multimedia files, like music and videos. Since its announcement, iTunes had become one of the largest online music streaming app.

According to Steve Job on Apple iTunes Press Release on 2001:

Apple has done what Apple does best — make complex applications easy, and make them even more powerful in the process. iTunes is miles ahead of every other jukebox application, and we hope its dramatically simpler user interface will bring even more people into the digital music revolution.”

But on October of 2008, one of today’s biggest online music store launches, the Spotify. Spotify has established its way to become iTunes greatest competitor in terms of online music sales. Though iTunes do offer more than music, still it acts to counter Spotify, thus the birth of Apple Music. Apple Music was launched on June of 2015 to counter Spotify in terms of online music sales, it copies Spotify’s monthly subscription plan prices, now it Apple Music dominates the online music sales. Other online music streaming apps like Youtube Red, Google Music, Amazon Music, Pandora, SoundCloud, TIDAL and Deezer all have a fair share of users. Through time, Apple received a lot of criticism on its iTunes app saying that the media management software is bloated because of the variety of the digital multimedia files that can be stored in it.

Alongside with the Apple Music, Apple also have apps like Apple TV and Podcasts, thus, giving the company enough reason to really let go of the 2 decade run of iTunes. On its annual WWDC 2019 or Worldwide Developer Conference 2019 currently being held at San Jose, California from June 3 to June 7 2019, the announcement was made by its CEO himself Tim Cook that iTunes is coming to an end, this is part of the company’s app strategy, instead of having iTunes where you can listen to music, watch movies and TV shows, hear podcasts, and organize it on the iTunes app, Apple will have separate apps for music and videos streaming and podcasts. The Apple Music, Apple TV and Podcasts.

iTunes has been the way Apple users listen to music, watch movies and TV shows, hear podcasts, and manage their devices for almost two decades. This year, Apple is finally ready to move into a new era. The company is launching a trio of new apps for the Mac – Music, TV, and Podcasts – to replace iTunes. That matches Apple’s media app strategy on iPhones and iPads. Without iTunes, customers can manage their Apple gadgets through the Music app.”

According to Mark Gurman of Bloomberg:

This gives a standalone app for each category which will give user a more convenient experience. This strategy is bringing Mac in line with iPhones and iPad. Aside from this announcement from the Worldwide Developer Conference 2019, Apple has featured a lot of software updates on its devices, for example, it is enhancing it Apple Watch devices, making it a more independent device from iPhones and iPads. Apple is also expected to announce the new OS on its devices.

10 Myths about Computer Viruses

In this age of computer technology advancement, security threat comes with it. Most of us rely on our personal computers, laptop or mobile devices to do day to day tasks, ordering grocery online, shopping online, and banking online- these were the major example of online transaction that we do. So with this being said, our devices should be free from viruses or malwares to make your personal information safe on your devices. So it is important to know when your computer is infected with viruses.

Here are the most used Myths about Computer Viruses. Viruses are type malicious software that is used by hackers to get into your personal device to collect private information including your log in credentials to may be your online banking account, thus compromising your saved money.

However, as important as you should know when your computer is infected, it is equally essential to really know if the information you know about computer viruses are true, since there are a lot of “Myths” about computer viruses out there that doesn’t even make any sense.

Here, we will list down top 10 Myths about Computer Viruses.

1. Apple or Mac Devices can’t get any viruses

Virus in Apple and Mac

FALSE! – Mac devices can also get viruses if you are not careful, especially Mac devices are on the rise, hackers are creating a viruses and software codes to get into these devices. Remember in 1982, the first computer virus set loose was coded for Apple devices, which was called Elk Cloner and was coded by a fifteen-year old. So if you have Mac device, or planning to have one, don’t be fooled by this myth and make sure to be careful using your device to avoid viruses that might steal your bank details and other personal information.

2. If your computer has Anti-Virus or Anti-malware installed, it can’t get any virus ever

FALSE! – Yes, it is advisable to get these trusted anti-virus or anti-malware installed into your devices, but it will not 100% guarantee that your computer can’t get any virus ever again. These software like, McAfee or AVG, will help your personal computers get rid of these viruses, but still, if you’re not being careful then you might get your computer a virus and yes this is just another myths about computer viruses.

3. Viruses were created by Anti-Virus or Anti-Malware Company

FALSE! – We said it is false because no evidence yet that supported this conspiracy. Viruses were created and written by hackers for the sole purpose of stealing money, and they do it by getting into your private information on your computer, like your bank details, etc. So having a legit and trusted anti-virus or anti-malware software is essential in gearing yourself away from these hackers and their viruses.

4. You will know immediately if your computer got virus

Myths about Computer Viruses

FALSE! – Though there are some viruses, depending on their creator, which can be noticed immediately, like if your computer suddenly shuts off, or there are a lot of pop-up windows, etc. But most virus writers makes their virus run so subtle, almost unnoticeable.  Example is the Storm worm which infected millions of PC around the world, this virus posing a breaking news about a severe weather condition in Europe, so when you click on the news piece it will get into your computer since it travel through an online network.

5. You will automatically contract the virus when you open a spam email in your inbox

FALSE! – opening a spam email will not automatically contract the virus on your PC that is unless you clicked a lick attached to it when you have the message opened. With that being said, always be careful in checking emails, yes, some email services provider like GMAIL has an automatic spam checker, but then again, some viruses run so unnoticeable, as what they say, think before you click.

6. Viruses will not affect you much if you don’t have any important file saved in your computer

FALSE! – Yes, you may have no important or private files saved in your computer, but somehow you did use your computer to go to the wen, and check your bank details, or did online shopping, so you still have entered some important log in credentials that a virus can detect and restore. Better be safe than sorry.

7. Your Personal Computer slows down when infected

FALSE! –  When your computer slows down, it does not necessarily mean it is infected with a virus, remember that creators of these viruses made sure that these viruses will run into your computer almost unnoticeably, though it is a possibility and you might want to scan your personal computers at these times, but try to also check if there are several programs opened all at once, or too many files are stored in it.

8. Your computer will be physically damaged because of the virus

FALSE! – A virus will not make your personal computer or laptop explode, though, depending on the virus, it might affect the performance of the computer, for example if the virus was able to penetrate into your laptops BIOS, which is somewhat like responsible for the hardware functions, thus, this will cause some hardware to act weird not function at all.

9. Pop-ups are Virus

FALSE! – Pop-ups happen on some certain websites, though some are legit pop-up ads, be careful because there are some that are not, especially on adult sites. When this happen, just don’t click the pop-up, close it and go back to your original site.

10. If your computer is infected, just reinstall the Windows and copy everything back

FALSE! – reinstalling the Windows and copying everything back will re-infect your personal computer. To get rid of viruses on your computer, you have to use a trusted anti-virus or anti-malware software to clean the virus out. This will scan your data to make sure they are free from viruses. In most cases, it is not necessary to reload your computer’s operating system if its infected, a trusted anti-virus software will do.

There you have it, these are the most common misconception about computer viruses.

SMS Bombing Operation in Passwordless Database Uncovered by a Security Researcher

Passwordless Database breached
Passwordless Database breached

Bob Diachenko, a Cyber Threat Intelligence Director and a journalist at SecurityDiscovery.com has uncovered a massive SMS Bombing Operation that exposes millions of users’ information.

You might be wondering why is the uncovering of SMS bombing so relevant. Well, let us start first to elaborate what is SMS Bombing, it is basically sending duplicated text messages that can be sent to several cellular phone users at a time. It uses a software program called “SMS Bomber”, this software program is mostly used for SMS marketing products and services by legitimate companies. However, these companies have their customers consent to receive such text messages. In the case of this passwordless database which was uncovered by Bob Diachenko on April 11th, the users’ information might be used by hackers or fraudster for illegal acts such as phishing techniques.

According to Bob Diachenko on the article he published for SecurityDiscovery.com, he discovered an unprotected MongoDB instance named ApexSMS, this database has millions of data relevant to SMS operations, in fact, according to Diachenko, one prominent folder contained an astounding 80, 055, 125 records.

Some information contained in the database were as follows:

  • Hashed email
  • First and Last Name
  • City, State, Country and Zip Codes
  • IP Address
  • Phone Number
  • Carrier Network for Mobile
  • Line Type (Mobile or Landline)

Allegedly the owners of this database may have an official cover as MobileDrip.com, however it is not yet confirmed since they have not receive yet any response from Mobiledrip.com, which according to its website: “Mobile Drip is a cloud based SMS platform that’s optimized for high volume messaging with all the tracking, automation, segmentation, and data management features you need to maximize the profitability of your campaigns.” The also indicated on their website that they will not knowingly engage in spam.

Legitimate companies mostly use SMS Marketing, thus Mobiledrip.com clearly describe how automated SMS Marketing works:

  • Attach drip campaigns to your lists and list segments to completely automate your sending.
  • Drip campaigns include the same features as broadcasting
  • Rotating Providers, Rotating Messages
  • Auto-replacing Domains
  • Segmenting data by carrier, gender, ethnicity, and location so you can optimize the messages you’re sending based on the leads
  • View stats for each message inside the drip campaigns
  • View drip message queue and history with stats on all messages.

On the other hand, Diachenko said that these information might be used to trick people to click on untrusted links or any phishing techniques which mostly victimized older people. Thus, this issue really raises concern about security and protection of the users’ information, it also affects the legitimate companies who does SMS Marketing to send information to their customers.

With this, let us all be careful to believe in text messages that we received, especially those which came from an unknown number or source. Always make sure to validate first, it is ok to be doubtful sometimes especially when you know that your information security is at stake.

Amazon Was Victimized By a Pervasive Fraud with Hackers Stealing Merchant Funds

The world’s biggest online retail platform, and ecommerce giant, Amazon Inc. was victimized of an extensive fraud from May to October of 2018, according to a U.K legal document.

Amazon lawyer said it already had done an investigation about the incident and asked a London judge to approve searches of account statements in which hackers funneled the funds into. Hackers were able to break in to more than 100 seller accounts and siphoned cash from sales and loans directly to their own bank accounts, which was reported to be wtih Barclays Plc and Prepaid Technologies Ltd.

Amazon legal counsel said that hackers may have used phishing techniques to obtain sellers log in credentials, thus giving them pledge access to their accounts and then changed their bank account information to their own. And their investigation confirms that the first instance of hacking activity was on May 16, 2018.

Though it is unclear on how much the hackers stole, Amazon said that it issued more than $1 billion dollars in loans to merchant in 2018, that makes the incident more concerning since the amount of money involve might be millions. Amazon Inc. said that it will continue to enhance and develop its online system to make sure these incidents will not happen again, and also sends message to the affected seller, as well as to those who are not, to be very vigilant about phishing techniques.

On the court filing, Amazon lawyers said that they need the documents “to investigate the fraud, identify and pursue the wrongdoers, locate the whereabouts of misappropriated funds, bring the fraud to an end and deter future wrongdoing,”.

Barclay Plc particularly said that they have strict guidelines and a very sophisticated fraud system and will make sure the incident will be dealt with accordingly. Both Barclay Plc and Prepaid Technologies were known to be party associated with Mactercard Inc. 

Amazon upholds its promise to their customer about protection and security of their information, following with another technical issue of their websites that occurred before Black Friday last year, this was when the issue inadvertently posted customer names and email addresses to its website. This incident has been taken care of swiftly, Amazon sends out an email notification to their affected customers regarding the technical issue, the customers were told on the email about:

“Our website inadvertently disclosed your email address or name and email address due to a technical error. The issue has been fixed. This is not a result of anything you have done, and there is no need for you to change your password or take any other action. The impacted customers have been contacted. Amazon takes all security-related matters very seriously and your account security is our top priority. We have policies and security measures in place to ensure that your personal information remains secure.”

– Amazon sends out email to their affected customers.

Hidden Backdoors in Huawei-supplied Vodafone Equipment Found

Hidden Backdoors in Huawei Chips for Vodafone Found

It was last quarter of 2007 when Huawei and Vodafone strategic partnership started, Huawei Technologies Co. Ltd. sends equipment to Vodafone, like routers. Since then, this strategic partnership has led to many more other opportunities, including the recently announce 5G network project.

But the same as usual friendship stories, Huawei and Vodafone has faced some compromising situations.

Back in 2009 when Vodafone initially found some bugs in Huawei routers, the Chinese-giant tech company immediately took an action and made sure that the issue has been fixed. And true enough, business went back as usual. Hidden Backdoors in Huawei devices are rampant and has been criticized by the United States.

But according to Bloomberg report, in 2011 and 2012 there are some backdoors that were found by Vodafone from the Huawei equipment. Particularly, in 2011, Vodafone, Italy, revealed that upon further penetration testing and checking, there are backdoors identified in some parts of its fixed access network known as optical service nodes, which are responsible for transmitting internet connection over optical fibers. In 2012, another identified backdoor found on other parts called broadband network gateway, which are responsible for user authentication and access to the internet. According to reports these vulnerabilities were also present in United Kingdom, Spain, Portugal and Germany.

Backdoors are their entry on committing Cybersecurity crimes

Hidden Backdoors in Huawei Chips

Backdoors, in cybersecurity terms, is somewhat like a hidden program, it bypasses security controls to access systems. These backdoors were actually common to software program for legitimate uses, for example, providing manufacturers in restoring users’ password.

Thus, this issue raises concern about potential unauthorized access to users’ information. But both Vodafone and Huawei assured that these vulnerabilities has been resolved the same year it was discovered. Hidden Backdoors in Huawei are blatantly used by some hackers

The United States on the other hand, alongside some other countries have already banned Huawei products due to some security concerns. Joining the United States were Australia, Japan and Taiwan.

The ban from the United States were based on the allegations of the Trump administration, that these equipment might invite some espionage from the Chinese State, and trying to persuade other western countries to block Huawei’s equipment as well. And so Canada and New Zealand were most likely to follow the step. But the Chinese tech-giant Huawei has denied the allegations, saying that they have nothing to do with the Chinese government.

With this, Vodafone, Europe’s largest telecommunication company, said that they are opposing the banning of Huawei’s equipment saying that Washington should prove their allegations. This amid the race for 5G network technology projects that Huawei and Vodafone signed for a strategic partnership. Europe is Huawei’s largest market outside China.

According to the company statement from Vodafone,

“In the telecoms industry it is not uncommon for vulnerabilities in equipment from suppliers to be identified by operators and other third parties, Vodafone takes security extremely seriously and that is why we independently test the equipment we deploy to detect whether any such vulnerabilities exist. If a vulnerability exists, Vodafone works with that supplier to resolve it quickly.”


On the other hand, Huawei issued a statement saying. “Like every ICT vendor we have a well-established public notification and patching process, and when a vulnerability is identified we work closely with our partners to take the appropriate corrective action.”

Huawei’s Android License Revoked by Google – updates

Google Android Banned Huawei - Huawei’s Android License Revoked by Google - updates

As the title says Huawei’s Android License Revoked by Google. Yes, The internet is going crazy when Google announces that they are revoking Android license to Huawei. This issue caused too much noise in social media, and much of a concern to Huawei smartphone users.

The Shenzhen based Chinese giant-tech Company, Huawei Technologies Co. Ltd. faces another devastating news. Google has revoked their license on Android OS effective immediately. This is in line with the Trump Administration’s decision to blacklist Huawei devices to the United States.

Huawei’s Android License Revoked by Google – No Longer can deliver Google Services

Huawei being the second top smartphones manufacturing in the world in terms of sale, next only to Apple. Not only smartphones, but Huawei is also a top manufacturing of internet-related devices, like routers- which dominates Europe sales. They have been the target of the Trump administration, accusing that Huawei equipment are being used for espionage by the Chinese State.  This allegation has been long denied by the company saying that they are not a government owned company and that they are not beholden to Beijing. But fewer countries followed the ban of Huawei devices concerning the same reason with the US government, these countries include Australia, Japan and Taiwan.

With the rising trade war and diplomatic tension between China and US, President of the United States, Donald Trump, signed an executive order and declared a national emergency to prohibit US company from sending hardware goods to Huawei. This however does not bother Huawei since according to them they have more than enough stockpile of hardware goods.

But as part of the blacklisting of the US government, Google has revoked Huawei’s Android license and it is effective right away, this means that Huawei will no longer have access to proprietary apps and services from Google,” as reported by Reuters.  

In simpler terms, Huawei and its sub-brand Honor will no longer have newer updates of Android Operating Service henceforth. But assured that existing Huawei devices will be working as usual and can still update apps on the Google Play Store. Google also twitted on May 20, 2019 in Twitter with their Android Account: “For Huawei users’ questions regarding our steps to comply w/ the recent US government actions: We assure you while we are complying with all US gov’t requirements, services like Google Play & security from Google Play Protect will keep functioning on your existing Huawei device.”

This means also that Huawei will no longer be part of the Android Beta Programs starting with the next release of Android OS upgrades. Also the phones that they will be manufacturing will no longer be Android supported.

In a statement from Huawei in response to all these matter:

“Huawei has made substantial contributions to the development and growth of Android around the world. As one of Android’s key global partners, we have worked closely with their open-source platform to develop an ecosystem that has benefitted both users and the industry.

Huawei will continue to provide security updates and after sales services to all existing Huawei and Honor smartphone and tablet products covering those have been sold or still in stock globally.

We will continue to build a safe and sustainable software ecosystem, in order to provide the best experience for all users globally.”

– Huawei

Following the footsteps of Google in cutting ties with Huawei are American computer hardware manufacturing companies such as Qualcomm, Intel, Xilinx and Broadcom. These companies also announced that they will break trade with Huawei Technologies Co. Ltd. effective also immediately. According to a Bloomberg report, analyst Ryan Koontz said that “Huawei is heavily dependent on U.S. semiconductor products and would be seriously crippled without supply of key U.S. components,” These companies plays a very significant role to Huawei, for example, Intel is Huawei’s primary supplier of chips sued for data centers, Qualcomm being responsible for SnapDragon SoC’s for Honor 8c and Broadcomm supplies packet switching chips for telecom equipment. These actions again are in lined with the US government blacklisting Huawei in the United States. Reportedly, there are almost 30 American companies which are essential suppliers for Huawei and will also soon break ties with the company.

These has put Huawei into a really bad situations. But considering that they are a huge company, the only plausible option that Huawei can do for now is to create its own operating system, which has been rumored to already work on by the company. As we all know, in contrary, Google Play Store and Apple Store are ban in China, Chinese smartphone users have their own operating system and own app store. If Huawei will have their own operating system, the challenge for them is to introduce it to their user, since it has been overly known that Huawei has Android all along, so shifting the operating system to a new one might be a bit of a challenge to their users which were used to have Android.

With all these matters happening to Huawei, it announced that their launching of the new Honor 20 will not be affected. The launch of the Honor 20 series will still push through on May 21, 2019 in London.


In May 20, 2019, days after the ban was implemented, the United States Commerce department granted Huawei a “Temporary General License”, this license is giving Huawei 90 days, that’s until August 19, 2019, to “maintain existing networks and provide software updates to existing Huawei handsets.

And with this grant from The United States Commerce Department, Google has reversed its decision about the revocation of Android license to Huawei, Google will now continue to send software updates to Huawei devices until August 19, 2019.

According to Google Spokesperson : “Keeping phones up to date and secure is in everyone’s best interests and this temporary license allows us to continue to provide software updates and security patches to existing models for the next 90 days.” 

After the 90 day temporary license, the United States Commerce Department will reassess the situation and will move forward from there. But it is good to know that Huawei android phones are back to normal and safe.

Capturing Your Visitor’s Email Address: Why is it important?

On this post you will learn how to collect email address on your website and why it is important to do so.

There are several bloggers and online business owners don’t realize the importance of capturing their visitors’ email address. According to the Baymard Institute, there is 69.57% average documented online shopping cart abandonment rate. That’s like more than half of your shoppers go visit your online shop, pick something they are interested into but then realize that they don’t need to buy it right away, and what’s worst is, they end up forgetting about it after few days. So that’s where capturing your visitors’ email address plays an important role in your online business. You have to get those website visitors’ come back to your website. So you should consider having an email list to grow your business.

What is an email list? An email list is a list of names and email addresses of your online shop visitors who gave you permission to send them any information related to your business, may it be like, an update to the items on their shopping carts, new items for sale, launching a new item and much more other related information. According to the Data and Marketing Association (DMA), on average business in the United States, email marketing sees 4300 percent ROI (Return of Investment).

How to Collect Email Address on Your Website

This is because when a visitor converted into email subscribers providing all their information and contacts, meaning they are interested in your products and have a very high possibility of becoming a paying customer. In fact, if you have noticed, a big social media platform is using email list too to get engaged with their members as frequent as they could. Facebook, YouTube, Twitter, and Instagram? You can’t create an account without an email address that is how important it is.

How to Collect Email Address on Your Website and Why it is important to do so.

Here’s why building an email list is important for your online business or blog site:

1.    Personalized and Targeted Approach

Personalized approached on email marketing- fakedata
Personalized approached on email marketing- fakedata

–    We all know email is personal, imagine if you can land your message to their email addresses? It’s like a friend sending them a message. You can make your message direct but personal. If a visitor turned into an email subscriber, there is a high chance that they are interested in your contents or products, and knowing what they like, you can personalize your messages and make highly relevant offers to get them more interested.

2.    One-on-One Conversation

–    Email is private. People read their email messages privately, so directly, they can you questions and feel confident about it because of the privacy. It’s building trust and connection with your email subscribers. Once you have it, it will not be so hard to indirectly inform them to go visit your website again.

3.    Most People Use Emails

–    Email is everywhere, in this era of advanced technology and online connections, email is necessary and most people have it. When you sign up for a social media account or when you are applying for a job, an email address is asked. So make it as an advantage for you to reach as many people as you could on your email list. The more website visitors you convert to becoming an email subscriber, the better for your business.

4.    Continued Conversation

–    Don’t stop communicating, you can always remind you subscriber about anything about your site, like updates and any related information. Refresh their mind about their experience in visiting your site, refresh their memory about the things they like about your site. Remind them

5.    Thank them for doing business

–    Now since you got their trust and confidence, and you have built a personal connection to your email subscribers, express to them how grateful you are with them. And let them know you are the best website they have ever visited. You can send relevant offers, like discounts and promotions, as a way for you to say thank you. You can send updates about a new product that is coming and as an email subscriber, they get the chance to check the products first before it is even launched.

And that my friend is How to Collect Email Address on Your Website and why you need to do so. There are a bunch of email marketing services online that can help you build your own email list for your business.  We hope that this article helps you make up your mind and start building your own email list for your online business.

Google throws in the towel for the failed Google+ Social Network

Last April 02, 2019, giant tech company Google finally bids goodbye to Google Plus, their social media platform attempting to compete with Facebook and Twitter. The shutdown was due to “low usage” and because it turned out to be Google’s security liability.  The initial closure was announced way back October of 2018, when the first security bug exposed account information of about 500,000 users, including their names, email addresses, and occupations. So the company decided to shut down the service in August of 2019. However, on the following month, Google revealed that it discovered a massive second security bug of Google’s application programming interfaces or API, and it exposed over 52.5 million users account information, again including users’ name, email addresses, occupations, and age. Thus, the reason why Google has decided to accelerate the procedure of the shutdown from August of 2019 to April of 2019.

Though Google confirmed that they did not find any evidence that the security bug exposed users’ financial data, national identification numbers or passwords to developers. But still caused so many concerns to the millions of users around the globe. Which makes Google react promptly into it,

Due to Security Vulnerabilities

“We discovered this bug as part of our standard and ongoing testing procedures and fixed it within a week of it being introduced,”

“We have always taken this seriously, and we continue to invest in our privacy programs to refine internal privacy review processes, create powerful data controls, and engage with users, researchers, and policymakers to get their feedback and improve our programs.”

Google announced via a blog post.

This leads to expediting the shutdown on all Google Plus API within the next 90 days after its discovery of the second security bug. And shutdown of Google Plus from August of 2019 to April of 2019.

But prior to the announcement of shutdown last year, Google has already drawn some ire from consumers on its early days, that is because Google had somewhat like forced their consumer to comment on the other services they have like YouTube, and also linking the Gmail services to getting a Google Plus account, things which really did not sit well with consumers. Thus, resulting in fewer users of the social media platform. Some tech experts’ say that the security bugs somehow gives Google a reasonable decision to completely shut down their social media platform for good, this reason somewhat like covers up the fact that the Google Plus project is not well received by consumers.

Google+ is Just a Spec of What Google Is

Moreover, we all know that Google is a giant tech company, and is a leader on technology advancements. And the shutdown of Google Plus project does not really affect them much in terms of consumer credibility. Developments and advancements on Google’s services do not stop here, sooner or later, Google may release a new social media platform that is good enough to compete with Facebook, Twitter, and Instagram, and we can’t for it to happen. After all, Google has already established its name in terms of technological advancements.