Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How and where to opt ...

 Privacy

Within a year, Google plans to stop supporting so-called third-party cookies, a technology that advertisers have used for decades to track users, in its Chrome browser. But this doesnt mean such tracking will simply stop. It would be odd if the tech giant, whose revenue comes mostly from online advertising,   show more ...

voluntarily gave up the ability to collect user data. Instead, third-party cookies will be replaced by a new technology — Google Ad Topics. In fact, Google Ad Topics is already here: the company integrated it into the Chrome browser this summer and recently started to roll it out to the Android operating system. In this post, we explore how Ad Topics works, where to disable it in the Chrome and Android settings, and what else you can do to avoid being tracked by online advertisers. A little history: Google Privacy Sandbox and FLoC Lets first go back a bit to Google Privacy Sandbox. This is what Google calls the entire initiative to abandon third-party cookies and replace them with different technologies for targeted advertising. Google first started talking about this initiative back in August 2019. As you can see, its taken them four years to develop specific solutions for phasing out cookies. The purpose of this initiative is, on the one hand, to get rid of technology thats widely perceived as a violation of privacy. On the other hand, Google wants to find a way to continue showing personalized ads to users — maintaining the competitive advantage that made it an internet giant. If you look at the Wikipedia article on Privacy Sandbox, youll find a long list of candidate technologies that Google planned to use to move away from third-party cookies. However, in 2021, a technology called Google FLoC emerged as the primary candidate. Lets discuss it in more detail. What is Google FLoC? FLoC (Federated Learning of Cohorts) was a technology proposed by Google aimed at changing the approach to targeted online advertising — making it more private. Instead of using individual user behavior data to personalize ads, FLoC grouped users with similar interests — meaning similar browsing histories — into cohorts. These cohorts were then assigned a unique identifier, which advertisers can use to target their ads. One of the key advantages in terms of user privacy was that FLoC didnt send user activity information to Google servers, but processed the data locally — directly on the users device. Its worth noting that, despite the name, FLoC didnt actually use federated learning. Its use was initially planned, but it turned out that local computing was good enough. What is federated learning? Its a variant of machine learning — an alternative to the centralized learning approach. In centralized learning, data from all devices is uploaded to a central server where the AI model is trained. In federated learning, data isnt sent to a central server; instead, local models are trained on local data directly on the devices. These devices then exchange the training results, rather than the user data itself, with the server. Based on the results of this local training, a global AI model is built — thus, the local AI models and the global AI model mutually train each other. This is all done to eliminate the need for centralized storage of user data. As is often the case with attempts to have ones cake and eat it too, the technology was criticized from both sides. Despite Googles claims that FLoC is 95% as effective as third-party cookies, advertisers werent satisfied with the technologys performance. Privacy advocates, in turn, were extremely unhappy that FLoC didnt adequately address user privacy concerns — and also that millions of Chrome users were included in the testing of FLoC without their consent. However, the main privacy concern regarding Google FLoC was its highly precise methods for categorizing users — the possible number of cohorts exceeded 30,000 — which allowed too much scope for user tracking. A significant portion of the internet industry quickly took up arms against Google FLoC, including all Chromium-based browser developers — which refused to include FLoC in their products, and Amazon — which disabled FLoC on all its websites. Consequently, just a few months after the testing of FLoC began, Google decided to freeze the project. Already by early 2022, they officially announced the abandonment of FLoC in favor of another technology — Topics API. What is Google Ad Topics (Topics API) Google Ad Topics (also known as Topics API) is a technology that Google is currently planning to use to replace third-party cookies for targeted advertising. Ad Topics functions somewhat similarly to FLoC: it also relies on browser history (in the case of Chrome) or app usage (in the case of Android), through which a locally operating algorithm tries to identify user interests. However, there are significant differences: while FLoC grouped users with similar interests into cohorts with unique identifiers, Topics API only compiles a list of things that interest the user — that is, topics. At the time of writing this article, there were 629 such topics, but this list is constantly being updated, so the number will continue to grow. In Google Ad Topics, each webpage on the internet is associated with a certain topic. The algorithm constantly updates the list of Google topics assigned to the user based on what theyve visited recently. Heres how it works: Every week, the user is assigned five topics based on the sites they visited the most that week. Three lists of five topics each are created for the last three weeks. A site that wants to show ads to the user requests the topics assigned to that user from Topics API. The algorithm randomly selects one topic from each of the three lists and provides the site with these three topics for displaying targeted ads. The topics assigned to the user are stored for only three weeks. Older topics are deleted, and a list of five new topics is generated every week. Since there is an element of randomness in the selection of topics, it seems that identifying a specific user or even a narrow group of users from such information is not so easy. Nevertheless, even soft and gentle tracking is still tracking, and targeted advertising is not to everyones taste. The good news is that Google allows you to not only manually configure Ad Topics but also to disable them altogether. For the sake of your privacy, we recommend doing this. How to disable Google Ad Topics in the Chrome Browser To disable Google Ad Topics data collection in the Chrome settings, go to Settings -> Privacy and security -> Ad privacy. The main point of interest on this tab is the first option, Ad topics. Click on this option and turn off the switch in the window that opens. Where to disable Google Ad Topics in the Android settings Alternatively, you can go directly to the Google Ad Topics settings by entering the following path in the Chrome address bar: chrome://settings/adPrivacy/interests While youre in this part of the browser settings, it doesnt hurt to disable two other options on the Ad privacy tab: Site-suggested ads and Ad measurement. Thats it! Youve successfully disabled Google Ad Topics in the Chrome browser. Note! Chrome settings are specific to each user profile. So, if you use Chrome with multiple Google accounts on the same computer, youll need to disable Ad Topics for each account separately. Go through all your Chrome profiles and repeat the steps above. How to disable Google Ad Topics in the Android operating system Disabling Google Ad Topics in the Android operating system must be done directly in your smartphones settings. To do this, go to Settings -> Google -> Ads -> Ads privacy -> Ad topics and turn off the switch in the window that appears. Where to disable Google Ad Topics in the Android settings Again, since youre already adjusting the privacy settings, go back to Settings -> Google -> Ads -> Ads privacy and also disable App-suggested ads and Ad measurement. Now, go one step back to Settings -> Google -> Ads and click on Delete advertising ID. Please note that this guide is for the standard version of Android. Depending on the manufacturer, smartphone model, and firmware version, the names of settings and paths might vary slightly. If you cant find them following these instructions, try using the search in the Android settings. Note! If you disable Google Ad Topics on Android and then receive a notification about new ad privacy features, Google Ad Topics might be re-enabled automatically. If that happens, its best to go to your smartphone settings and make sure its turned off. How to opt out of personalized ads in the Google Account settings Still with adjusting your privacy and ad settings, theres one more thing worth doing: disable personalized ads for your Google account. To do this, go to the Googles My Ad Center page. If you havent disabled personalized Google ads yet, this page will be covered with colorful category and brand tiles. You can hang around here for a long time, choosing what kind of advertising you want to see. Google My Ad Center, where you can manage ad personalization But dont let the pretty advertising distract you — rather than choosing anything here, its best to just turn it all off. What youre looking for here is a shy little switch at the top right of the page labeled Personalized ads — switch it to Off. How to disable personalized ads in Google My Ad Center Note! This setting is also specific to each Google account. Therefore, if you use multiple accounts, you need to disable personalized ads separately for each of them. All set? Congratulations! Youve now used all the available settings that help you avoid unnecessary attention from both Google and advertisers. More privacy But why limit yourself to the anti-tracking options Google provides in the settings of its products and services? Its a good idea to use additional methods of combating data collection. In particular, we recommend the Private Browsing feature available in all our paid subscriptions — Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.

 Breaches and Incidents

Researchers have discovered a new Android Trojan called GoldDigger that can primarily target users of over 50 Vietnamese banking apps, as well as e-wallets and crypto-wallets. GoldDigger's reach may extend beyond Vietnam. Countering them demands client-side fraud protection solutions that emphasize real-time protection, adaptability, and a focus on behavioral indicators.

 Feed

Dubbed Looney Tunables, Qualys discovered a buffer overflow vulnerability in the glibc dynamic loader's processing of the GLIBC_TUNABLES environment variable. This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c.

 Feed

Ubuntu Security Notice 6416-2 - It was discovered that the IPv6 implementation in the Linux kernel contained a high rate of hash collisions in connection lookup table. A remote attacker could use this to cause a denial of service. Daniël Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD processors   show more ...

utilising speculative execution and branch prediction may allow unauthorised memory reads via a speculative side-channel attack. A local attacker could use this to expose sensitive information, including kernel memory.

 Feed

Red Hat Security Advisory 2023-5486-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12   show more ...

and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.

 Feed

Red Hat Security Advisory 2023-5485-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12   show more ...

and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.

 Feed

Red Hat Security Advisory 2023-5491-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.11.2 includes security and bug   show more ...

fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

 Feed

Red Hat Security Advisory 2023-5488-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12   show more ...

and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.

 Feed

Red Hat Security Advisory 2023-5484-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12   show more ...

and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.

 Feed

Red Hat Security Advisory 2023-5476-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Issues addressed include buffer overflow and privilege escalation vulnerabilities.

 Feed

Red Hat Security Advisory 2023-5479-01 - Red Hat OpenShift Serverless Client kn 1.30.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.30.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. This release includes security and bug fixes, and enhancements. Issues addressed include a bypass vulnerability.

 Feed

Red Hat Security Advisory 2023-5475-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.3.1. Issues addressed include buffer overflow, out of bounds write, and use-after-free vulnerabilities.

 Feed

Debian Linux Security Advisory 5518-1 - It was discovered that missing input sanitising in the encoding support in libvpx, a multimedia library for the VP8 and VP9 video codecs, may result in denial of service.

 Feed

Debian Linux Security Advisory 5517-1 - Multiple security vulnerabilities were discovered in libx11, the X11 client-side library, which may result in denial of service or the execution of arbitrary code.

 Feed

Debian Linux Security Advisory 5516-1 - Multiple security vulnerabilities were discovered in libxpm, the X11 pixmap library, which may result in denial of service or the execution of arbitrary code.

 Feed

Red Hat Security Advisory 2023-5472-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.

 Feed

Red Hat Security Advisory 2023-5458-01 - Libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it.

 Feed

Red Hat Security Advisory 2023-5455-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Issues addressed include buffer overflow, privilege escalation, and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2023-5461-01 - ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2023-5453-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Issues addressed include buffer overflow, privilege escalation, and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2023-5474-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2023-5454-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Issues addressed include buffer overflow and privilege escalation vulnerabilities.

 Feed

Red Hat Security Advisory 2023-5473-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a denial of service vulnerability.

 Feed

Multiple security vulnerabilities have been disclosed in the Intelligent Platform Management Interface (IPMI) firmware for Supermicro baseboard management controllers (BMCs) that could result in privilege escalation and execution of malicious code on affected systems. The seven flaws, tracked from CVE-2023-40284 through CVE-2023-40290, vary in severity from High to Critical, according to Binarly

 Feed

GitHub has announced an improvement to its secret scanning feature that extends validity checks to popular services such as Amazon Web Services (AWS), Microsoft, Google, and Slack. Validity checks, introduced by the Microsoft subsidiary earlier this year, alert users whether exposed tokens found by secret scanning are active, thereby allowing for effective remediation measures. It was first

 Feed

Threat actors have been observed targeting semiconductor companies in East Asia with lures masquerading as Taiwan Semiconductor Manufacturing Company (TSMC) that are designed to deliver Cobalt Strike beacons. The intrusion set, per EclecticIQ, leverages a backdoor called HyperBro, which is then used as a conduit to deploy the commercial attack simulation software and post-exploitation toolkit.

 Feed

Ensuring sensitive data remains confidential, protected from unauthorized access, and compliant with data privacy regulations is paramount. Data breaches result in financial and reputational damage but also lead to legal consequences. Therefore, robust data access security measures are essential to safeguard an organization’s assets, maintain customer trust, and meet regulatory requirements.  A

 Feed

As much as $7 billion in cryptocurrency has been illicitly laundered through cross-chain crime, with the North Korea-linked Lazarus Group linked to the theft of roughly $900 million of those proceeds between July 2022 and July of this year. "As traditional entities such as mixers continue to be subject to seizures and sanctions scrutiny, the crypto crime displacement to chain- or asset-hopping

2023-10
Aggregator history
Friday, October 06
SUN
MON
TUE
WED
THU
FRI
SAT
OctoberNovemberDecember