Language Selection

English French German Italian Portuguese Spanish

Company develops way to restore cookies

Filed under
Software
Security

The company behind those floating ads that dance across Web pages has developed a way to restore the data profiles that many privacy-conscious users try to delete from their computers.

Most users don't know what they are doing when they run antispyware programs that delete the profiles, known as cookies, said Mookie Tenembaum, founder of United Virtualities Inc.

By deleting cookies, he said, users thwart efforts by Web sites to prevent the same ads from appearing over and over. Tenembaum said visitors are also forced to repeatedly enter usernames and passwords, which are sometimes stored in the profiles.

United Virtualities calls the product Persistent Identification Element. It taps a separate profile system that's found in Macromedia Inc.'s Flash and that's not generally affected by antispyware programs.

Using the product, when a Web site discovers a cookie missing, it can look for a backup in Flash and restore the cookie.
Richard M. Smith, a privacy and security consultant in Cambridge, Mass., was critical of United Virtualities.

"Companies should respect people's choices," he said, "If a consumer makes the effort of getting antispyware software, they don't want this stuff."

Source.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News