Blog Posts Tagged with "Cookies"
July 19, 2012 Added by:f8lerror
DEUCE went from simple concept to a multi-encoding and encryption DLP bypass tool. The program simply takes an input file and creates a cookie for each line. DEUCE has the ability to encrypt via AES, hash with MD5 or use a custom multi-encode with a 3 times replacement cipher...
June 01, 2012 Added by:Ahmed Saleh
You should acknowledge that Cookies are widely used and can't really be avoided. If you wish to enjoy your internet surfing experience by navigating to “cookie creating websites” you should have a clear understanding of how cookies operate, and how to protect them from being abused...
April 27, 2012 Added by:Electronic Frontier Foundation
A coalition of companies say they "only" want to track opted-out users for security purposes, market research, testing and improving their various advertising and tracking products, auditing, copyright enforcement and other "legal compliance" purposes, not other purposes...
February 26, 2012 Added by:Ben Rothke
February 26, 2012 Added by:Electronic Frontier Foundation
One way that Google can prove itself as a good actor is by providing meaningful ways for users to limit what data is collected. It’s time Google's third-party web servers start respecting Do Not Track requests, and time for Google to offer a built-in Do Not Track option...
February 24, 2012 Added by:Brittany Lyons
LinkedIn has faced scams and viral attacks, and users have watched private information become public without their permission. Online vulnerability is a problem, and though LinkedIn has addressed issues in a punctual manner, this does not prevent new problems from arising...
December 07, 2011 Added by:Dan Dieterle
A look at the top viruses for each country shows a lot of cookie based viruses. Which may or may not be real viruses, but the rates are high none the less. But how does this compare to what other vendors are finding?
May 26, 2011 Added by:Headlines
"The attack exploits a vulnerability in the IE security zones feature... By embedding a special iframe tag in a malicious website, an attacker can circumvent this cross zone interaction and cause the browser to expose cookies stored on the victim's computer..."
May 23, 2011 Added by:Headlines
"There exists multiple vulnerabilities in LinkedIn in which it handles the cookies and transmits them over SSL. This vulnerability if exploited, can result in hijacking of user accounts, and/or modifying the user information without the consent of the profile owner..."
April 24, 2011 Added by:Theresa Payton
If restrictions to cookies become common place on the internet, the Internet Advertising Bureau will be forced to make major changes to the way they obtain information about internet users. This could alter the entire structure of internet advertising as we know it today...
March 31, 2011 Added by:Headlines
Referrer headers sent to the third parties contain a unique identifier that is associated with a cookie issued by LinkedIn. The suit maintains that this practice reveals sensitive information regarding the referring member's browsing habits and history...
February 25, 2011 Added by:Robert Siciliano
February 01, 2011 Added by:David Navetta
Companies that handle personal information, especially those that provide online behavioral advertising services, and those that purchase or participate in such services, should consider a risk assessment of their policies, processes and activities in order to reduce legal risks...
January 13, 2011 Added by:Rafal Los
On one end of the argument you must concede that in order to have an acceptable user experience you must be tracked to some acceptable extent, while the other end of the argument would say that we don't want web sites, vendors and nation-states/organizations tracking us and our browsing habits...
January 06, 2011 Added by:Robert Siciliano
Most major websites now install cookies on your computer, which track what you do online. Over time, these cookies develop a profile, which becomes your digital fingerprint, to a certain extent. Microsoft, Google, Facebook, and most major newspapers, retailers, and advertisers are in on the game...
December 12, 2010 Added by:Stefan Fouant
Recent activity around a new Firefox extension developed by a pair of researchers brings the issue of session hijacking front and center. Firesheep essentially enables an attacker to grab other people's credentials and use them to gain access to various web sites...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013