The Latest in IT Security

Browser-based fingerprinting: implications and mitigations

30
Aug
2016
Browser-based fingerprinting: implications and mitigations

Browser-based fingerprinting implications and mitigations

Malware authors will leverage every tool and trick they can to keep their operations in complete stealth mode. Fingerprinting gives them this extra edge to hide from security researchers and run large campaigns almost completely undetected. To describe it succinctly, fingerprinting makes use of an information disclosure flaw in the browser that allows an attacker to read the user’s file system and look for predefined names.

There are plenty of examples on how successful fingerprinting can be.

Read More

Leave a reply


Categories

WEDNESDAY, AUGUST 21, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks