Within a year, Google plans to stop supporting so-called third-party cookies, a technology that advertisers have used for decades to track users, in its Chrome browser. But this doesnt mean such tracking will simply stop. It would be odd if the tech giant, whose revenue comes mostly from online advertising, show more ...
voluntarily gave up the ability to collect user data. Instead, third-party cookies will be replaced by a new technology — Google Ad Topics. In fact, Google Ad Topics is already here: the company integrated it into the Chrome browser this summer and recently started to roll it out to the Android operating system. In this post, we explore how Ad Topics works, where to disable it in the Chrome and Android settings, and what else you can do to avoid being tracked by online advertisers. A little history: Google Privacy Sandbox and FLoC Lets first go back a bit to Google Privacy Sandbox. This is what Google calls the entire initiative to abandon third-party cookies and replace them with different technologies for targeted advertising. Google first started talking about this initiative back in August 2019. As you can see, its taken them four years to develop specific solutions for phasing out cookies. The purpose of this initiative is, on the one hand, to get rid of technology thats widely perceived as a violation of privacy. On the other hand, Google wants to find a way to continue showing personalized ads to users — maintaining the competitive advantage that made it an internet giant. If you look at the Wikipedia article on Privacy Sandbox, youll find a long list of candidate technologies that Google planned to use to move away from third-party cookies. However, in 2021, a technology called Google FLoC emerged as the primary candidate. Lets discuss it in more detail. What is Google FLoC? FLoC (Federated Learning of Cohorts) was a technology proposed by Google aimed at changing the approach to targeted online advertising — making it more private. Instead of using individual user behavior data to personalize ads, FLoC grouped users with similar interests — meaning similar browsing histories — into cohorts. These cohorts were then assigned a unique identifier, which advertisers can use to target their ads. One of the key advantages in terms of user privacy was that FLoC didnt send user activity information to Google servers, but processed the data locally — directly on the users device. Its worth noting that, despite the name, FLoC didnt actually use federated learning. Its use was initially planned, but it turned out that local computing was good enough. What is federated learning? Its a variant of machine learning — an alternative to the centralized learning approach. In centralized learning, data from all devices is uploaded to a central server where the AI model is trained. In federated learning, data isnt sent to a central server; instead, local models are trained on local data directly on the devices. These devices then exchange the training results, rather than the user data itself, with the server. Based on the results of this local training, a global AI model is built — thus, the local AI models and the global AI model mutually train each other. This is all done to eliminate the need for centralized storage of user data. As is often the case with attempts to have ones cake and eat it too, the technology was criticized from both sides. Despite Googles claims that FLoC is 95% as effective as third-party cookies, advertisers werent satisfied with the technologys performance. Privacy advocates, in turn, were extremely unhappy that FLoC didnt adequately address user privacy concerns — and also that millions of Chrome users were included in the testing of FLoC without their consent. However, the main privacy concern regarding Google FLoC was its highly precise methods for categorizing users — the possible number of cohorts exceeded 30,000 — which allowed too much scope for user tracking. A significant portion of the internet industry quickly took up arms against Google FLoC, including all Chromium-based browser developers — which refused to include FLoC in their products, and Amazon — which disabled FLoC on all its websites. Consequently, just a few months after the testing of FLoC began, Google decided to freeze the project. Already by early 2022, they officially announced the abandonment of FLoC in favor of another technology — Topics API. What is Google Ad Topics (Topics API) Google Ad Topics (also known as Topics API) is a technology that Google is currently planning to use to replace third-party cookies for targeted advertising. Ad Topics functions somewhat similarly to FLoC: it also relies on browser history (in the case of Chrome) or app usage (in the case of Android), through which a locally operating algorithm tries to identify user interests. However, there are significant differences: while FLoC grouped users with similar interests into cohorts with unique identifiers, Topics API only compiles a list of things that interest the user — that is, topics. At the time of writing this article, there were 629 such topics, but this list is constantly being updated, so the number will continue to grow. In Google Ad Topics, each webpage on the internet is associated with a certain topic. The algorithm constantly updates the list of Google topics assigned to the user based on what theyve visited recently. Heres how it works: Every week, the user is assigned five topics based on the sites they visited the most that week. Three lists of five topics each are created for the last three weeks. A site that wants to show ads to the user requests the topics assigned to that user from Topics API. The algorithm randomly selects one topic from each of the three lists and provides the site with these three topics for displaying targeted ads. The topics assigned to the user are stored for only three weeks. Older topics are deleted, and a list of five new topics is generated every week. Since there is an element of randomness in the selection of topics, it seems that identifying a specific user or even a narrow group of users from such information is not so easy. Nevertheless, even soft and gentle tracking is still tracking, and targeted advertising is not to everyones taste. The good news is that Google allows you to not only manually configure Ad Topics but also to disable them altogether. For the sake of your privacy, we recommend doing this. How to disable Google Ad Topics in the Chrome Browser To disable Google Ad Topics data collection in the Chrome settings, go to Settings -> Privacy and security -> Ad privacy. The main point of interest on this tab is the first option, Ad topics. Click on this option and turn off the switch in the window that opens. Where to disable Google Ad Topics in the Android settings Alternatively, you can go directly to the Google Ad Topics settings by entering the following path in the Chrome address bar: chrome://settings/adPrivacy/interests While youre in this part of the browser settings, it doesnt hurt to disable two other options on the Ad privacy tab: Site-suggested ads and Ad measurement. Thats it! Youve successfully disabled Google Ad Topics in the Chrome browser. Note! Chrome settings are specific to each user profile. So, if you use Chrome with multiple Google accounts on the same computer, youll need to disable Ad Topics for each account separately. Go through all your Chrome profiles and repeat the steps above. How to disable Google Ad Topics in the Android operating system Disabling Google Ad Topics in the Android operating system must be done directly in your smartphones settings. To do this, go to Settings -> Google -> Ads -> Ads privacy -> Ad topics and turn off the switch in the window that appears. Where to disable Google Ad Topics in the Android settings Again, since youre already adjusting the privacy settings, go back to Settings -> Google -> Ads -> Ads privacy and also disable App-suggested ads and Ad measurement. Now, go one step back to Settings -> Google -> Ads and click on Delete advertising ID. Please note that this guide is for the standard version of Android. Depending on the manufacturer, smartphone model, and firmware version, the names of settings and paths might vary slightly. If you cant find them following these instructions, try using the search in the Android settings. Note! If you disable Google Ad Topics on Android and then receive a notification about new ad privacy features, Google Ad Topics might be re-enabled automatically. If that happens, its best to go to your smartphone settings and make sure its turned off. How to opt out of personalized ads in the Google Account settings Still with adjusting your privacy and ad settings, theres one more thing worth doing: disable personalized ads for your Google account. To do this, go to the Googles My Ad Center page. If you havent disabled personalized Google ads yet, this page will be covered with colorful category and brand tiles. You can hang around here for a long time, choosing what kind of advertising you want to see. Google My Ad Center, where you can manage ad personalization But dont let the pretty advertising distract you — rather than choosing anything here, its best to just turn it all off. What youre looking for here is a shy little switch at the top right of the page labeled Personalized ads — switch it to Off. How to disable personalized ads in Google My Ad Center Note! This setting is also specific to each Google account. Therefore, if you use multiple accounts, you need to disable personalized ads separately for each of them. All set? Congratulations! Youve now used all the available settings that help you avoid unnecessary attention from both Google and advertisers. More privacy But why limit yourself to the anti-tracking options Google provides in the settings of its products and services? Its a good idea to use additional methods of combating data collection. In particular, we recommend the Private Browsing feature available in all our paid subscriptions — Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.
The information leaked in the breach involves personally identifiable information as well as genetic ancestry data, potential relatives, and geolocations.
Clorox anticipates continued operational strain in the second quarter but hopes to benefit from restocking retailer inventory, while assessing the long-term impact on earnings.
The scheme, known as BADBOX, deploys the Triada malware as a "backdoor" on various devices such as CTV boxes, smartphones, and tablets during the supply chain process in China.
The Department of Homeland Security is investigating the attack to determine if sensitive physical security information was compromised, but it was not a breach of any DHS network or system.
The United States, Canada, and Italy are the countries with the highest number of organizations with exposed ICSs, while sectors such as Education, Technology, and Government show the least secure ICS security.
Builders Mutual Insurance Co. experienced a data breach that compromised the personal information of over 64,000 customers and employees, including sensitive data like Social Security numbers and medical information.
The CISA is focusing on the growing threat activity from China, which has become the top nation-state cyber adversary to the U.S., particularly targeting critical infrastructure like rail transportation and energy sectors.
The Electronic Privacy Information Center (EPIC) has filed a complaint urging the FTC to investigate Grindr for potentially illegally storing and disclosing users' sensitive data, including HIV and vaccination status.
The leaked data from a misconfigured web server includes names, email addresses, and subject lines of individuals who sought information from Lorenz, spanning from June 2021 to September 2023.
IT and security teams are facing new responsibilities, such as ensuring security for remote and hybrid workers, managing applications in public cloud environments, and securing data in SaaS environments.
The authentication bypass vulnerability in JetBrains TeamCity has already seen exploitation attempts from 74 unique IP addresses, while the privilege escalation flaw in Microsoft Windows CNG Key Isolation Service has no documented exploitation.
Businesses are investing more in cybersecurity resources and training, resulting in a decrease in phishing links clicked by workers and ransomware attacks, according to GetApp.
The Node.js malware Lu0Bot uses unconventional programming languages and multi-layer obfuscation. Lu0Bot utilizes a unique approach to domain connection and assembles various parts into a single entity within the JavaScript code.
The data obtained by the attacker may include personal information, genetic ancestry results, and potential relatives' details of 23andMe customers who opted-in to the "DNA Relatives" service.
According to Microsoft, ransomware gangs are evolving their tactics, with an increase in data exfiltration attacks and the targeting of smaller organizations and less well-known software.
The attackers are using a Remote Management System (RMS) executable to trick victims into downloading malware disguised as banned applications like ExpressVPN, WeChat, and Skype.
The Royal Women's Hospital in Melbourne has experienced a data breach, potentially compromising the personal information of 192 patients. The breach occurred when cybercriminals gained unauthorized access to a staff member's private email account.
Qakbot malware operators have continued their malicious activities, distributing Ransom Knight ransomware and the Remcos backdoor via phishing emails, despite the recent infrastructure takedown.
Researchers have discovered a new Android Trojan called GoldDigger that can primarily target users of over 50 Vietnamese banking apps, as well as e-wallets and crypto-wallets. GoldDigger's reach may extend beyond Vietnam. Countering them demands client-side fraud protection solutions that emphasize real-time protection, adaptability, and a focus on behavioral indicators.
The breach involved health information, Social Security numbers, and financial data of donors and clients, prompting Blackbaud to pay a ransom to the intruder in exchange for deleting the stolen data.
Proof-of-concept exploits for this vulnerability have already been published, posing a significant threat to systems running the latest releases of popular Linux platforms.
The data breach involved impersonation tactics and phishing traps on instant messaging platforms, highlighting the importance of verifying URLs and avoiding unknown sources.
The attack highlights the ongoing vulnerability of courts in the US to various types of cyber threats, including ransomware campaigns, data leaks, and distributed denial-of-service attacks.
Semiconductor companies in East Asia are being targeted by a China-linked threat actor using a backdoor called HyperBro to deploy Cobalt Strike beacons. The attack chain includes the use of social engineering techniques, such as decoy PDF documents.
Dubbed Looney Tunables, Qualys discovered a buffer overflow vulnerability in the glibc dynamic loader's processing of the GLIBC_TUNABLES environment variable. This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c.
Ubuntu Security Notice 6416-2 - It was discovered that the IPv6 implementation in the Linux kernel contained a high rate of hash collisions in connection lookup table. A remote attacker could use this to cause a denial of service. Daniël Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD processors show more ...
utilising speculative execution and branch prediction may allow unauthorised memory reads via a speculative side-channel attack. A local attacker could use this to expose sensitive information, including kernel memory.
Red Hat Security Advisory 2023-5486-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 show more ...
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.
Red Hat Security Advisory 2023-5485-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 show more ...
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.
Red Hat Security Advisory 2023-5491-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.11.2 includes security and bug show more ...
fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Red Hat Security Advisory 2023-5488-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 show more ...
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.
Red Hat Security Advisory 2023-5480-01 - Red Hat OpenShift Serverless release of OpenShift Serverless Logic. This release includes security fixes. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-5484-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 show more ...
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.
Red Hat Security Advisory 2023-5476-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Issues addressed include buffer overflow and privilege escalation vulnerabilities.
Red Hat Security Advisory 2023-5479-01 - Red Hat OpenShift Serverless Client kn 1.30.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.30.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. This release includes security and bug fixes, and enhancements. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-5475-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.3.1. Issues addressed include buffer overflow, out of bounds write, and use-after-free vulnerabilities.
Debian Linux Security Advisory 5518-1 - It was discovered that missing input sanitising in the encoding support in libvpx, a multimedia library for the VP8 and VP9 video codecs, may result in denial of service.
Debian Linux Security Advisory 5517-1 - Multiple security vulnerabilities were discovered in libx11, the X11 client-side library, which may result in denial of service or the execution of arbitrary code.
Debian Linux Security Advisory 5516-1 - Multiple security vulnerabilities were discovered in libxpm, the X11 pixmap library, which may result in denial of service or the execution of arbitrary code.
Red Hat Security Advisory 2023-5472-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-5458-01 - Libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it.
Red Hat Security Advisory 2023-5455-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Issues addressed include buffer overflow, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5461-01 - ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-5453-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Issues addressed include buffer overflow, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-5474-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-5465-01 - FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD.
Red Hat Security Advisory 2023-5454-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Issues addressed include buffer overflow and privilege escalation vulnerabilities.
Red Hat Security Advisory 2023-5473-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a denial of service vulnerability.
Multiple security vulnerabilities have been disclosed in the Intelligent Platform Management Interface (IPMI) firmware for Supermicro baseboard management controllers (BMCs) that could result in privilege escalation and execution of malicious code on affected systems. The seven flaws, tracked from CVE-2023-40284 through CVE-2023-40290, vary in severity from High to Critical, according to Binarly
GitHub has announced an improvement to its secret scanning feature that extends validity checks to popular services such as Amazon Web Services (AWS), Microsoft, Google, and Slack. Validity checks, introduced by the Microsoft subsidiary earlier this year, alert users whether exposed tokens found by secret scanning are active, thereby allowing for effective remediation measures. It was first
Threat actors have been observed targeting semiconductor companies in East Asia with lures masquerading as Taiwan Semiconductor Manufacturing Company (TSMC) that are designed to deliver Cobalt Strike beacons. The intrusion set, per EclecticIQ, leverages a backdoor called HyperBro, which is then used as a conduit to deploy the commercial attack simulation software and post-exploitation toolkit.
Ensuring sensitive data remains confidential, protected from unauthorized access, and compliant with data privacy regulations is paramount. Data breaches result in financial and reputational damage but also lead to legal consequences. Therefore, robust data access security measures are essential to safeguard an organization’s assets, maintain customer trust, and meet regulatory requirements. A
As much as $7 billion in cryptocurrency has been illicitly laundered through cross-chain crime, with the North Korea-linked Lazarus Group linked to the theft of roughly $900 million of those proceeds between July 2022 and July of this year. "As traditional entities such as mixers continue to be subject to seizures and sanctions scrutiny, the crypto crime displacement to chain- or asset-hopping
A joint advisory from the United States's National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) has shone a light on the top ten most common cybersecurity misconfigurations found in large private and public organisations. Read more in my article on the Tripwire State of Security blog.
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine
One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who they claim to be. Here’s how to recognize them.