HOTTEST

Image: Mozilla
With the release of Firefox 79 last week, Mozilla silently added a new feature to Enhanced Tracking Protection (ETP) — Firefox’s internal component that blocks invasive user-tracking techniques.
According to Mozilla, Firefox 79 can now block a new technique called “redirect tracking.”
Online advertisers and web analytics companies have recently begun adopting this new technique after Firefox, Chrome, Brave, and other browsers have recently included privacy protections inside their code to block user tracking and user fingerprinting scripts.
More specifically, this technique was developed to circumvent browsers that prevent advertisers from using third-party cookies to track users.
Third-party cookies allowed an advertiser to drop a cookie file inside the user’s browser from its allocated ad slot. As the user navigated across the web, the advertiser would read the user’s local cookie from within ad slots on different sites — allowing the advertiser to track the user’s movements across the web.As browsers now prevent advertisers from dropping this cookie, some ad tech companies came up with the bright idea of redirecting users (who interact with their ads) to one of their domains, read the cookie file, and then redirect the user to their destination effectively creating their own first-party (tracking) cookies instead of relying on third-party cookies created on other sites.
Firefox to clear cookies for ad tech companies each day
Mozilla says that going forward, it plans to clear first-party cookies every 24 hours for all known advertisers as a way to prevent redirect tracking. This way, even if advertisers employ redirect tracking, users will have a brand new identity each day, preventing companies from linking previous activity to a unique user profile.
The browser maker said this new protection is included in Enhanced Tracking Protection 2.0, the next iteration of its ETP feature. While currently only active for Firefox 79 users, Mozilla said ETP 2.0 would eventually roll out to all users within the next few weeks.
However, Mozilla says that blocking redirect tracking won’t be active for all known ad tech companies.
“Sometimes trackers do more than just track; trackers may also offer services you engage with, such as a search engine or social network,” Mozilla said, hinting at companies like Google, Microsoft, Facebook, or Twitter.
“If Firefox cleared cookies for these services we’d end up logging you out of your email or social network every day,” it said.
For these sites, Mozilla said it would clear cookies every 45 days.
Additional details about redirect tracking are available on the MDN developer network. More
Amazon Follow ZDNET: Add us as a preferred source<!–> on Google. ZDNET’s key takeaways Amazon is hosting a Devices & Services event on September 30. The invitation suggests we can expect new Echo speakers, Fire TV products, and a new Kindle. ZDNET will be at the event to provide the most up-to-date coverage. Amazon is preparing for […] More

Maria Diaz/ZDNETFollow ZDNET: Add us as a preferred source More

Package and mail delivery giant Pitney Bowes has suffered a second ransomware attack in the past seven months, ZDNet has learned. The incident came to light today after a ransomware gang known as Maze published a blog post claiming to have breached and encrypted the company’s network. The Maze crew provided proof of access in […] More

Organisations need to have better plans in place to prevent cyberattacks – but they should be more transparent about when they do fall victim to hackers in order to prevent others from meeting the same fate, according to the former head of the US National Security Agency (NSA). As director of the NSA and Commander of US Cyber Command from 2014 to 2018, Admiral Michael S Rogers oversaw cybersecurity during a period of time when the threat of cyberattacks from criminals and foreign government-backed hacking operations grew significantly.
ZDNet Recommends
And while companies can act individually to improve their own cybersecurity, Rogers believes that – for the best possible benefit – companies need to share strategies, techniques and best practices for defending against common cyber threats, particularly when attackers seem to be able to deploy the same techniques again and again to go after different targets.SEE: A winning strategy for cybersecurity (ZDNet special report)”One thing that really frustrates me – and I used to say this when I was in government with the senior leadership of our nation – I wanted that the pain of one should lead to the benefit of many,” said Rogers, now an operating partner at Team8, a cybersecurity venture group, in an interview with ZDNet Security Update.”Why do the same techniques keep working over and over and over again? We’re talking years – the same techniques literally used for years. One of my takeaways was because we don’t talk or acknowledge this activity. Most companies do not want to publicly acknowledge a cyber penetration,” he said.It’s still uncommon for organisations that are hit by cyberattacks to go into detail about what happened, such as by explaining how cyber criminals were able to enter their network or what needed to be done to secure it after an attack.
That means that there isn’t the opportunity for other companies to learn useful information about the incident that they can then use to prevent attacks. That’s something Rogers says has to change – and he believes there’s already a successful model to follow in the collaborative nature of how the aviation industry investigates incidents.”In the US, we use a structure that says any time there is an aviation accident, the government steps in and there is a formal investigation,” he said. “We determine the causes and the mitigating factors, we publish them and then we say, given that, what changes do we need to make?”It’s an indicator of the effectiveness of that methodology, they tend not to continue to recur, the same cause repeatedly over time, because we’re able to address problems” Rogers continued”That is not the case in cyber, so I’d like us to learn from some others,” he said.
By learning from the mistakes of others, organisations can be provided with the information and guidance necessary to make their networks more resistant and more resilient to attacks. Because ultimately, if carrying out successful campaigns is more difficult for cyber criminals, they’re going to find it harder to make money.SEE: Ransomware: It’s a ‘golden era’ for cyber criminals – and it could get worse before it gets better”We’ve got to become much more resilient and able to continue to operate, because if we can continue to operate it buys us more time and, quite frankly, it also reduces disposition on the part of many companies to pay a ransom,” said Rogers.”If we make this less lucrative for criminals, you won’t see as much criminal activity,” he added.For Rogers, the challenge now is for organisations to focus not just on keeping malicious intruders from gaining access to their network, but also on having plans in place to ensure they are able to continue operating in some capacity, even if hackers have breached the network.”Cybersecurity needs to include, not only cyber defence, but we need to spend a whole lot more time thinking about cyber resilience. So if, despite my best efforts, an adversary is going to be able to penetrate my network structure, what are the tools, what are the methodologies, what are the capabilities, what can I do to try to maximize my ability to continue to operate?” he said.MORE ON CYBERSECURITY More
Internet of Things
Samsung Spotlights Next-generation IoT Innovations for Retailers at National Retail Federation’s BIG Show 2017
That’s Fantasy! The World’s First Stone Shines And Leads You to The Right Way
LG Pushes Smart Home Appliances To Another Dimension With ‘Deep Learning’ Technology
The Port of Hamburg Embarks on IoT: Air Quality Measurement with Sensors




