Your Web Surfing History Is Accessible Without Your Permission

The Web surfing history saved in your Web browser can be accessed without your permission. JavaScript code deployed by real websites and online advertising providers use browser vulnerabilities to determine which sites you have and have not visited, according to new research from computer scientists at the University of California, San Diego.

“JavaScript is a great thing, it allows things like Gmail and Google Maps and a whole bunch of Web 2.0 applications; but it also opens up a lot of security vulnerabilities. We want to let the broad public know that history sniffing is possible, it actually happens out there, and that there are a lot of people vulnerable to this attack,” said UC San Diego computer science professor Sorin Lerner.

The researchers documented JavaScript code secretly collecting browsing histories of Web users through “history sniffing” and sending that information across the network. While history sniffing and its potential implications for privacy violation have been discussed and demonstrated, the new work provides the first empirical analysis of history sniffing on the real Web. Continue reading …

Related Posts

Open standards made mandatory for public administrations Open standards have been made mandatory for the IT systems of Hungary's public administrations. The Hungarian parliament voted in favour of amendment...
One more reason to not use Skype for Linux Even though Skype for Linux is unlike most applications available on any Linux installation, that is, it is a proprietary application, it has long bee...
WhiteHat Aviator: A browser for privacy and security, but is proprietary and for OS X only... WhiteHat Aviator is a Web browser that's just been released by WhiteHat Security, a Web security company based in Santa Clara, California. At a time w...
Install Unity Tweak Tool on Ubuntu 14.10 For both new and experienced users, most especially for new users, System Settings, Ubuntu's graphical management application, offers a simple, point-...
Clustering Atomic Hosts with Kubernetes, Ansible, and Vagrant A single Atomic Host is a fine place to run your containers, but these hosts are much more fun when bunched into clusters, a task that we can manage w...
Tor, trust and the NSA Tor is an anonymizing network that's designed to protect you by "bouncing your communications around a distributed network of relays run by volunteers...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Your Web Surfing History Is Accessible Without Your Permission -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*