Browsers May Invite Cyber-Sleuths

Published: 4 December 1999 y., Saturday
If you read an unsolicited e-mail, someone could be tracking your Web surfing. Enabled by a security loophole in your browser, this possible cyber-spying has privacy and consumer groups up in arms. The groups are asking the U.S. Federal Trade Commission to require software makers to take action and close the loophole. A letter and a detailed report of the security hole was sent this week to the FTC by organizations including the Electronic Privacy Information Center, Electronic Frontier Foundation, and antispam group Junkbusters, according to a joint statement issued Thursday. The problem affects people with e-mail readers formatted in HTML, which includes popular programs such as Outlook, Outlook Express, Netscape Messenger, Eudora, and Hotmail, according to the report, written by Richard Smith, a security consultant. Although most people know that when they visit a Web site, it creates a cookie, or unique serial number, which allows their surfing behavior to be traced, many do not know that a cookie can be created when they read an unsolicited e-mail via a Web browser, Smith says in the report. A cookie is created when users read such a message with graphics in it, such as a banner advertisement off the Web. These banner ad companies typically "hide" the recipient_s e-mail address in the Web address of the graphic, so that their servers can later match the cookie to the recipient_s e-mail address, Smith_s report says. This information is often sold to spammers, or senders of unsolicited commercial e-mails. The problem could be solved if Microsoft and Netscape Communications closed the security hole in their browsers, Smith_s report says.
Šaltinis: IDG News Service
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Hotmail Targets Web Beacons

Microsoft on Thursday announced Hotmail users could block HTML images from appearing in e-mail messages, in a move meant to foil spammers trolling for valid e-mail addresses more »

U.S. agencies defend gov't data-mining plans

Leaders of two much-criticized projects that privacy advocates fear will collect massive amounts of data on U.S. residents defended those projects before the U.S. Congress Tuesday more »

Microsoft unveils hardware partner portal

Site holds resources for hardware and driver software makers more »

search.lt news

search.lt presents newest links more »

Europe's Borderless Market: The Net

Business-to-business e-commerce is thriving more »

Poland - Lucent to expand Netia's ATM broadband network

Lucent Technologies has been executing the second phase of the ATM multiservice network for Netia, one of Poland's largest independent telecommunications service providers more »

Business Users Clearly Define Spam

The difference between spam and desired e-mail is whether the user has previously transacted business with the sender. more »

The Great IT Complexity Challenge

Technology is supposed to help simplify transactions and increase the speed of doing business, but often that is not the way it works more »

Immigration applications online

The Bureau of Citizenship and Immigration Services will start accepting immigration applications filed through the Internet on May 29 more »

search.lt news

search.lt presents newest links more »