#DataPrivacyWeek: Online Trackers Can Detect 80% of Users’ Browsing History

Read Time:1 Minute, 42 Second

#DataPrivacyWeek: Online Trackers Can Detect 80% of Users’ Browsing History

Online trackers can capture up to 80% of users’ browsing histories, with the practice far more pervasive than previously realized. This is according to Norton Labs’ quarterly Consumer Cyber Safety Pulse Report, which analyzed online advertising trackers from October to December 2021.

It showed that consumers are tracked by an average of 177 different organizations per week while browsing online, raising significant privacy concerns. The researchers noted that the top trackers can view 80% of an average user’s browsing history despite appearing on a smaller number of unique domains.

The study also found that half the tracking organizations encountered by a user in a typical week collect this information within the initial two-hour browsing period. This suggests that even if users clear their browsing history every day, it would only take an average of two hours to re-encounter half of all online trackers.

Darren Shou, head of technology at NortonLifeLock, commented: “While it’s common knowledge that web trackers follow us around the internet, our online privacy researchers were surprised to find that some online trackers know up to 80% of a user’s browsing history. We hope these findings shine a light on online tracking and empower consumers to take back their online privacy.”

The new report also revealed cybercrime and online fraud trends during 2021. The company said it blocked around 3.6 billion cyber-threats worldwide last year, equating to nearly 10 billion per day. This includes 53.9 million phishing attempts, 221 million files threats, 1.4 million mobile threats and 253,063 ransomware attacks.

Additionally, the researchers revealed how cyber-criminals continued to leverage the COVID-19 pandemic to launch scam attacks, as well as consumer interest in popular TV shows. This includes phishing scams disguised as merchandise offers linked to hit shows.

Last year, the UK’s Information Commissioner’s Office (ICO) called on G7 countries to work together to tackle cookie pop-ups and their impact on online users’ privacy.

Read More

#DataPrivacyWeek: Online Trackers Can Detect 80% of Users’ Browsing History

Read Time:1 Minute, 42 Second

#DataPrivacyWeek: Online Trackers Can Detect 80% of Users’ Browsing History

Online trackers can capture up to 80% of users’ browsing histories, with the practice far more pervasive than previously realized. This is according to Norton Labs’ quarterly Consumer Cyber Safety Pulse Report, which analyzed online advertising trackers from October to December 2021.

It showed that consumers are tracked by an average of 177 different organizations per week while browsing online, raising significant privacy concerns. The researchers noted that the top trackers can view 80% of an average user’s browsing history despite appearing on a smaller number of unique domains.

The study also found that half the tracking organizations encountered by a user in a typical week collect this information within the initial two-hour browsing period. This suggests that even if users clear their browsing history every day, it would only take an average of two hours to re-encounter half of all online trackers.

Darren Shou, head of technology at NortonLifeLock, commented: “While it’s common knowledge that web trackers follow us around the internet, our online privacy researchers were surprised to find that some online trackers know up to 80% of a user’s browsing history. We hope these findings shine a light on online tracking and empower consumers to take back their online privacy.”

The new report also revealed cybercrime and online fraud trends during 2021. The company said it blocked around 3.6 billion cyber-threats worldwide last year, equating to nearly 10 billion per day. This includes 53.9 million phishing attempts, 221 million files threats, 1.4 million mobile threats and 253,063 ransomware attacks.

Additionally, the researchers revealed how cyber-criminals continued to leverage the COVID-19 pandemic to launch scam attacks, as well as consumer interest in popular TV shows. This includes phishing scams disguised as merchandise offers linked to hit shows.

Last year, the UK’s Information Commissioner’s Office (ICO) called on G7 countries to work together to tackle cookie pop-ups and their impact on online users’ privacy.

Read More

New DeadBolt Ransomware Targets NAT Devices

Read Time:42 Second

There’s a new ransomware that targets NAT devices made by QNAP:

The attacks started today, January 25th, with QNAP devices suddenly finding their files encrypted and file names appended with a .deadbolt file extension.

Instead of creating ransom notes in each folder on the device, the QNAP device’s login page is hijacked to display a screen stating, “WARNING: Your files have been locked by DeadBolt”….

[…]

BleepingComputer is aware of at least fifteen victims of the new DeadBolt ransomware attack, with no specific region being targeted.

As with all ransomware attacks against QNAP devices, the DeadBolt attacks only affect devices accessible to the Internet.

As the threat actors claim the attack is conducted through a zero-day vulnerability, it is strongly advised that all QNAP users disconnect their devices from the Internet and place them behind a firewall.

Read More

New DeadBolt Ransomware Targets NAT Devices

Read Time:42 Second

There’s a new ransomware that targets NAT devices made by QNAP:

The attacks started today, January 25th, with QNAP devices suddenly finding their files encrypted and file names appended with a .deadbolt file extension.

Instead of creating ransom notes in each folder on the device, the QNAP device’s login page is hijacked to display a screen stating, “WARNING: Your files have been locked by DeadBolt”….

[…]

BleepingComputer is aware of at least fifteen victims of the new DeadBolt ransomware attack, with no specific region being targeted.

As with all ransomware attacks against QNAP devices, the DeadBolt attacks only affect devices accessible to the Internet.

As the threat actors claim the attack is conducted through a zero-day vulnerability, it is strongly advised that all QNAP users disconnect their devices from the Internet and place them behind a firewall.

Read More

Passwords are Like Toothbrushes – Not to Be Shared!!

Read Time:3 Minute, 59 Second

Sometimes, I feel that my brain is full! We are all bombarded with information on so many fronts and quite frankly, I often feel like I don’t have room for much more! A quick scroll on my socials and I’m inundated with news from friends (which I love) plus ads plus multiple news updates. I open my emails, and the same happens! So much information!! So little time! 

So, in the spirit of being brief and not overloading, I’m going to focus on one easy yet powerful way you can make a positive impact on your online safety – how you manage your password. Of course, I could add many more strategies to this list but let’s keep it simple – our brains are full!! 

Why Are Passwords So Important? 

Passwords are the key to everything we do online. Whether we are logging in to our emails, social media platforms, online banking, or favorite shopping websites – your password is your way in. And if you’re anything like me, you probably have multiple passwords. The last time I checked, I had over 100 different passwords stored in my True Key password manager! 

These small codes are so incredibly important because in short, they are the only thing stopping a hacker from accessing your online accounts. In many cases, they are your only defense strategy against a hacker taking over your accounts and creating havoc.  

Fortunately, there are several steps we can take to ensure we nail this password thing and minimize the risk of being hacked. Here are my top five: 

1. Don’t Share Your Passwords – no exceptions!! 

I have been saying to my kids for years: passwords are like toothbrushes – they are NOT to be shared! No exceptions. It doesn’t matter how much you love your best friend or girlfriend, your password is your password. When you are young and donning rose-colored glasses, you often don’t factor in that things can change. Relationships can sour and romance can die. If someone has access to your online accounts and they have hurt feelings then they have an opportunity to create chaos. And we’ve all read the stories… 

2. Use Different Passwords For Each Account 

Yes, I agree – this is a big pain! But it is probably one of the best ways of protecting yourself and here’s why. If you use the same password for each of your online accounts and your account is hacked then the hacker has access to all of your online accounts: your social media platforms, your banking, your entire life!  

3. Turn On 2 Factor Authentication Where Possible 

It will add another step to your login process but choosing 2-factor authentication (or multi-factor authentication) is another small yet powerful way to keep your password secure by adding another layer of protection to your passwords. In most cases, the additional factor is a code or a token sent to your mobile phone. Sometimes, a separate app can also be used to generate a code or token that will confirm it is really you trying to log in! 

4. Create Long and Complex Passwords 

Some experts believe length is more important than complexity but I say embrace both! If you can create a complex 16 character password that includes lower and upper case letters, numbers and symbols then you are doing very well! I am personally a fan of the crazy, nonsensical sentence. For example – GrassisRed&Blue7 – silly, nonsensical but memorable. I believe it’s all about making them hard to guess but easy to remember. And remember to NEVER use information in your passwords that other people might know about you or that is also included in your social media accounts eg your kids’ or pet’s names. 

5. Use A Password Manager 

I am sure my longevity has improved dramatically since using a password manager! Password managers, or vaults, are an absolute no-brainer. Not only do they store your passwords securely across your chosen devices, but they also help you create complex passwords that no human could even contemplate. I have it installed on both my laptop and my phone and it works seamlessly between both devices. It’s time to throw away your little black book of passwords, people! You’ll never look back once this whole password management process is automated. 

So, if you’re feeling a little overwhelmed at where to start with your digital safety this New Year then I implore you to make this one small change. Nailing your password strategy is without doubt one of the best ways of shoring up your online safety!  

Happy New Year!! 

Alex xx 

The post Passwords are Like Toothbrushes – Not to Be Shared!! appeared first on McAfee Blog.

Read More

Passwords are Like Toothbrushes – Not to Be Shared!!

Read Time:3 Minute, 59 Second

Sometimes, I feel that my brain is full! We are all bombarded with information on so many fronts and quite frankly, I often feel like I don’t have room for much more! A quick scroll on my socials and I’m inundated with news from friends (which I love) plus ads plus multiple news updates. I open my emails, and the same happens! So much information!! So little time! 

So, in the spirit of being brief and not overloading, I’m going to focus on one easy yet powerful way you can make a positive impact on your online safety – how you manage your password. Of course, I could add many more strategies to this list but let’s keep it simple – our brains are full!! 

Why Are Passwords So Important? 

Passwords are the key to everything we do online. Whether we are logging in to our emails, social media platforms, online banking, or favorite shopping websites – your password is your way in. And if you’re anything like me, you probably have multiple passwords. The last time I checked, I had over 100 different passwords stored in my True Key password manager! 

These small codes are so incredibly important because in short, they are the only thing stopping a hacker from accessing your online accounts. In many cases, they are your only defense strategy against a hacker taking over your accounts and creating havoc.  

Fortunately, there are several steps we can take to ensure we nail this password thing and minimize the risk of being hacked. Here are my top five: 

1. Don’t Share Your Passwords – no exceptions!! 

I have been saying to my kids for years: passwords are like toothbrushes – they are NOT to be shared! No exceptions. It doesn’t matter how much you love your best friend or girlfriend, your password is your password. When you are young and donning rose-colored glasses, you often don’t factor in that things can change. Relationships can sour and romance can die. If someone has access to your online accounts and they have hurt feelings then they have an opportunity to create chaos. And we’ve all read the stories… 

2. Use Different Passwords For Each Account 

Yes, I agree – this is a big pain! But it is probably one of the best ways of protecting yourself and here’s why. If you use the same password for each of your online accounts and your account is hacked then the hacker has access to all of your online accounts: your social media platforms, your banking, your entire life!  

3. Turn On 2 Factor Authentication Where Possible 

It will add another step to your login process but choosing 2-factor authentication (or multi-factor authentication) is another small yet powerful way to keep your password secure by adding another layer of protection to your passwords. In most cases, the additional factor is a code or a token sent to your mobile phone. Sometimes, a separate app can also be used to generate a code or token that will confirm it is really you trying to log in! 

4. Create Long and Complex Passwords 

Some experts believe length is more important than complexity but I say embrace both! If you can create a complex 16 character password that includes lower and upper case letters, numbers and symbols then you are doing very well! I am personally a fan of the crazy, nonsensical sentence. For example – GrassisRed&Blue7 – silly, nonsensical but memorable. I believe it’s all about making them hard to guess but easy to remember. And remember to NEVER use information in your passwords that other people might know about you or that is also included in your social media accounts eg your kids’ or pet’s names. 

5. Use A Password Manager 

I am sure my longevity has improved dramatically since using a password manager! Password managers, or vaults, are an absolute no-brainer. Not only do they store your passwords securely across your chosen devices, but they also help you create complex passwords that no human could even contemplate. I have it installed on both my laptop and my phone and it works seamlessly between both devices. It’s time to throw away your little black book of passwords, people! You’ll never look back once this whole password management process is automated. 

So, if you’re feeling a little overwhelmed at where to start with your digital safety this New Year then I implore you to make this one small change. Nailing your password strategy is without doubt one of the best ways of shoring up your online safety!  

Happy New Year!! 

Alex xx 

The post Passwords are Like Toothbrushes – Not to Be Shared!! appeared first on McAfee Blog.

Read More

Serious PwnKit flaw in default Linux installations requires urgent patching

Read Time:34 Second

Security researchers have found a privilege escalation vulnerability in pkexec, a tool that’s present by default on many Linux installations. The flaw, called PwnKit, could allow attackers to easily gain root privileges on systems if they have access to a regular user without administrative privileges.

Researchers from security firm Qualys who discovered and reported the vulnerability were able to confirm it is exploitable in default configurations on some of the most popular Linux distributions including Ubuntu, Debian, Fedora and CentOS. They believe others are likely impacted as well, since the vulnerable code has existed in pkexec since the tool’s first version, over 12 years ago.

To read this article in full, please click here

Read More

Serious PwnKit flaw in default Linux installations requires urgent patching

Read Time:34 Second

Security researchers have found a privilege escalation vulnerability in pkexec, a tool that’s present by default on many Linux installations. The flaw, called PwnKit, could allow attackers to easily gain root privileges on systems if they have access to a regular user without administrative privileges.

Researchers from security firm Qualys who discovered and reported the vulnerability were able to confirm it is exploitable in default configurations on some of the most popular Linux distributions including Ubuntu, Debian, Fedora and CentOS. They believe others are likely impacted as well, since the vulnerable code has existed in pkexec since the tool’s first version, over 12 years ago.

To read this article in full, please click here

Read More

SASE in the spotlight as businesses prioritize edge network security

Read Time:37 Second

Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation across cloud and infrastructure, applications, and workloads and closer to where data is generated or consumed. According to a new report from AT&T Business, edge network definitions and usage are in a state of flux across industries as organizations search for effective security strategies that address edge-related risks and allow them to explore its opportunities. Secure access service edge (SASE) is on the radar of some businesses seeking to augment traditional security controls, bring the network and security closer together, and allow for broader, more centralized visibility across an edge network attack surface.

To read this article in full, please click here

Read More

SASE in the spotlight as businesses prioritize edge network security

Read Time:37 Second

Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation across cloud and infrastructure, applications, and workloads and closer to where data is generated or consumed. According to a new report from AT&T Business, edge network definitions and usage are in a state of flux across industries as organizations search for effective security strategies that address edge-related risks and allow them to explore its opportunities. Secure access service edge (SASE) is on the radar of some businesses seeking to augment traditional security controls, bring the network and security closer together, and allow for broader, more centralized visibility across an edge network attack surface.

To read this article in full, please click here

Read More

News, Advisories and much more

Exit mobile version