user

Tue
01
Aug
John Lister's picture

Researchers: 'Anonymized' Browsing Data Can Reveal Identity

Researchers suggest that anonymized browsing data can be used to track users. The flaw can make it easy to reveal exactly what sites individuals have visited. Security experts Svea Eckert and Andreas Dewes told the Def Con security conference that ... they'd been able to identify adult websites a particular judge had visited, as well as a politician's online interest in drugs. The data came from so-called "clickstreams," which are simply a list of the sites an individual has visited and the order in which they visited them. They are commonly used by advertising firms to produce ... (view more)

Wed
05
Jul
John Lister's picture

Judge Says Facebook Cookie 'Tracking' was Legal

A judge has thrown out a lawsuit which accused Facebook of tracking web users after they logged out of the site. Judge Edward Davila said the people bringing the case hadn't proven any financial loss or a breach of reasonable privacy expectations. ... The case involves website cookies, which are small text files created by a browser and stored on a user's computer. The cookies are readable by websites and can be used to identify the user and customize the content they see when visiting a page. In this case, the cookies were being read by third party websites that included a "Facebook ... (view more)

Tue
30
May
John Lister's picture

Android Phones Hijacked for Ad Scam

Tens of millions of Android devices may have been infected by rogue apps that found a way past Google's security checks. The 'Judy' malware came through apps in the official Google Play store. Google makes a big deal about its Play Store being a ... safe place to get apps. If an app is obtained from another source other that the Play Store, users must specifically confirm any associated risk during app installation. That makes it particularly embarrassing for Google, considering that the Judy malware was able to slip through its security checks. The malware in question has been dubbed ... (view more)

Wed
12
Apr
John Lister's picture

Researchers: Phone Tilt Could Reveal PIN

Motion sensors in smartphones could give away your lock code to hackers according to new research. But practical limitations mean related attacks might have to be specifically targeted. Researchers at Newcastle University explored the idea that ... tools such as accelerometers, gyroscopes, compasses and GPS chips in phones could reveal more detail than users realize. The tools are used for a variety of functions such as location tracking, fitness tracking and gesture control such as a user turning a phone face down to instantly switch it to "do not disturb" mode. Their theory was that ... (view more)

Thu
16
Feb
Dennis Faas's picture

Report: You can be Tracked Online, even without IP or Cookies

Researchers have found a way to track web users even if they switch web browsers. It could improve security but also weaken online privacy. The researchers at Lehigh University in Pennsylvania were trying to find ways of improving fingerprinting. ... That's a way to attempt to identify an individual user (or at least their computer) without relying on single identifiers such as login details, browser cookies, or an IP address. Instead, fingerprinting involves taking multiple pieces of information provided by a user's browser such as the browser name, it's version, whether they have an ad blocker ... (view more)

Wed
30
Nov
John Lister's picture

Apple Users Flooded with 'Calendar Spam'

Apple experts warn that spammers are abusing the iPhone's calendar system. They say users should be wary of responding in any way to unexpected "event" invites. The problem appears to affect multiple Apple products, including Mac computers, iPhones ... and iPads. It takes advantage of the way Apple's system lets users create events and then invite friends and family by inputting their email address. The spammers, who appear to be based in China, are using large lists of email addresses to send invitations to non-existent events, usually listed as special offers on consumer goods ... (view more)

Tue
22
Nov
John Lister's picture

Smartphones Could Replace Cards at ATMs

A British bank is testing ATMs that let customers take out money using their phone rather than a bank card. It says the technology could be safer than using a card because there's less room for hackers to steal details. Withdrawing money without a ... card isn't a completely new idea. One rival bank already allows users to get cash out using a smartphone app that generates a unique code that they can then type in to the phone to get money. The idea is to remove the need to carry a card, for example on a night out. The new system from Barclays would be even quicker to use however, and ... (view more)

Fri
14
Oct
Dennis Faas's picture

How to Fix: Firefox Forget Username / Remove Autocomplete

Infopackets Bill P. writes: " Dear Dennis, I am using Windows 10 and Firefox. Recently I went to sign onto my banking website and entered in the wrong user name during the sign on. A few days later I went to sign onto the bank again and it seems ... that Firefox saved the incorrect user name to that field (note - I am not using the Firefox password manager to fill my fields, I am doing it manually). Normally when I visit my bank website, I enter in a few characters for my user name and then Firefox usually presents me with the correct user name as part of the field - sort of the same autocomplete ... (view more)

Thu
25
Aug
John Lister's picture

Facebook Labels Users Conservative or Liberal

Facebook users in the US may be able to find out if the site thinks they are conservative- or liberal-leaning. It's a side-effect of a new tool that makes it easier to influence advertisements which appear on the users' newsfeed. As reported ... recently, Facebook recently added new options which allow users to indicate that they don't want to see advertisements in the news feed related to specific topics. The new changes come as Facebook also prepares to roll out additional measures to prevent ad-blocking software from working on the site. To view the settings, users can visit their ... (view more)

Thu
11
Aug
John Lister's picture

Google Says Android Bug Overblown

Google says a set of security flaws on Android devices may not be as serious as initially feared. It says 90 percent of devices should be largely immune from what's been dubbed the "Quadrooter" exploit. A security research company found the problem ... in software which works with processors manufactured by Qualcomm, which are used in an estimated 900 million Android devices. The bugs affect the communication between different actions (known as processes) running on the phone at the same time. The name of the exploit (Quadrooter) comes from the fact that there are four ... (view more)

Pages

Subscribe to RSS - user