We’ve seen many examples of third-party cookies being tackled by browsers recently. It’s not so long ago that Firefox effectively locked down third-party tracking by isolating cookies into so-called jars. By doing so, their “Total Cookie Protection” seeks to prevent all those cookies on your PC communicating with one another. This mea
A form of individual tracking specific to your web browser is at the heart of a currently contested privacy battle, and one which Facebook has just got the upper hand to.
This type of tracking involves adding additional parameters to the URLs that you click on a daily basis. When you click one of these parameter-laden links, the organisation which added t
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of June 20, 2022. I’ve also included some comments on these stories.Over a Dozen Flaws Found in Siemens’ Industrial Network Manag
Cookies are in the news as Mozilla rolls out significant privacy changes for Firefox. The idea is to dramatically lessen the risk of privacy-invading tracking across websites without your knowledge. Tracking cookies have been a hot topic in recent months, as advertisers try switching to other methods of tracking. Will this make a noticeable difference to peo
Parental controls can be useful to limit the risks your children run into online, but you should know up front that they cannot eliminate every risk out there.
Parents and adults everywhere are understandably having a hard time keeping up with the favored social networks of children and adolescents, and that’s because the more “grown-ups” who sign u
More voices are being raised against the use of everyday technology repurposed to attack and stalk people. Most recently, it’s reported that Ohio has proposed a new bill in relation to electronic tagging devices.
The bill, aimed at making short work of a loophole allowing people with no stalking or domestic violence record to use tracking devices, i
Asset inventory is a significant part of a comprehensive security plan for all organizations. After all, if you do not know what assets you have, then you cannot manage them. Even a small company can amass a surprisingly large amount of assets. It is no surprise that accounting for all of these assets can be like chasing a moving target, as
January 24, 2022 4 0 Author: Billie Walden Why Do Users Name Their “FBI Surveillance Van” Wi-Fi?
October 01, 2021 13 0 Author: Amanda Johnson What’s Wrong with Amazon Echo Privacy? Intelligent speaker
Another day, another example of how the data sharing choices we make can come back to haunt us. The Guardian reports a Florida resident finding his bike ride data requested by law enforcement. This is due to his route taking him close to the scene of a burglary a year earlier.
According to the report, he had just seven days to put something in front of a
September 17, 2021 5 0 Author: Amanda Johnson WhatsApp Moderators Can View Users’ Private Messages
September 13, 2021 25 0 Author: Billie Walden Is Google Hangouts Safe? It’s no secret that the so
The largest crypto-robbery in history is rapidly turning into the most bizarre as well. Let’s start at the beginning…
In an apparent scream for mercy, 21 hours ago the Poly Network Team reached out via Twitter to “hacker(s)” that had managed to transfer roughly $600 million in digital tokens out of its control and into separate cryptocurrency
July 28, 2021 20 0 Author: Amanda Johnson Use QR codes securely: how to avoid fraudsters and fake codes
July 23, 2021 6 0 Author: Amanda Johnson We have had backdoors in our smartphones for 20 years Sometime
Announce
Share high-quality web security related articles with you:)