{"id":21334,"date":"2023-02-24T03:30:04","date_gmt":"2023-02-24T11:30:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/02\/24\/news-15065\/"},"modified":"2023-02-24T03:30:04","modified_gmt":"2023-02-24T11:30:04","slug":"news-15065","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/02\/24\/news-15065\/","title":{"rendered":"How to block tracker pixels and web beacons | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/02\/22060423\/web-beacons-explained-and-how-to-stop-them-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Anna Larkina| Date: Fri, 24 Feb 2023 11:14:54 +0000<\/strong><\/p>\n<p>Imagine you walk into a shopping mall and a stranger starts following you around the place. They make detailed notes of what stores you visit. If you take a promo flyer, they try to look over your shoulder to see if you read it closely enough. When you&#8217;re in a store, they use a stopwatch to measure the exact time you spend at each shelf. Sounds absurd and somewhat obnoxious, doesn&#8217;t it? Unfortunately, that&#8217;s exactly what happens every time you visit a major website, view e-mail from online stores or services, or use their official mobile apps. The person with the stopwatch is analytics systems connected to virtually every website, application, and e-mail campaign.<\/p>\n<p>Why do companies need this data? There are several reasons:<\/p>\n<ul>\n<li>To know your preferences better, and to suggest products and services that you&#8217;re more likely to buy. This is where the annoying bike ads come from, following you around two months after you visit a cyclists&#8217; website;<\/li>\n<li>To add more effective text and images to websites and e-mail messages. Companies test various caption, header and banner options, choosing the ones which customers focus on more;<\/li>\n<li>To identify the most popular sections of a mobile application or website, and how you interact with them;<\/li>\n<li>To test new products, services, and features;<\/li>\n<li>To sell user behavior and preference data to other companies.<\/li>\n<\/ul>\n<p>In a <a href=\"https:\/\/securelist.com\/web-beacons-on-websites-and-in-email\/108632\/\" target=\"_blank\" rel=\"noopener\">detailed Securelist post<\/a>, we examined the statistics on the busiest of &#8220;spies&#8221;: Google, Microsoft, and Amazon \u2013 the hungriest for (your) date by a wide margin.<\/p>\n<h2>How web beacons and tracker pixels work<\/h2>\n<p>The tracking activities described above are based on web beacons, also known as tracker pixels or spy pixels. The most popular tracking technique is to insert a tiny (so tiny as to be practically invisible) image \u2013 sized 1&#215;1 or even 0x0 pixels \u2013 into an e-mail, application, or web page. When your screen displays information, your e-mail client or browser requests to download the image from the server by transmitting information about you, which the server records: the time, device used, operating system, browser type, and page the pixel was downloaded from. This is how the operator of the beacon learns that you opened the e-mail or web page, and how. A small piece of code (JavaScript) inside the web page, which can collect even more detailed information, is often used instead of a pixel. Either way, the tracker is not visible in the e-mail message or on the website in any way: you simply cannot see it. Yet such beacons placed on every page or application screen make it possible to &#8220;follow you around&#8221; by tracking your navigation route and the time you spend at each stage of that route.<\/p>\n<h2>Cybercriminals and web beacons<\/h2>\n<p>Marketing agencies and tech companies are not the only ones that use web beacons: cybercriminals use them too. Web beacons are a convenient way of <a href=\"https:\/\/www.kaspersky.com\/blog\/tracking-pixel-bec\/36976\/\" target=\"_blank\" rel=\"noopener\">conducting preliminary reconnaissance for targeted e-mail attacks<\/a> (spear phishing, business e-mail compromise). They help cybercrooks find out what time their victims check (or don&#8217;t check) their mail to choose the best time for an attack: it&#8217;s easier to hack users&#8217; accounts or send fake e-mails in their name while the user is offline.<\/p>\n<p>User information, including behavior and interest data, can get leaked in the wake of a hacker attack. Even market leaders such as <a href=\"https:\/\/www.business-standard.com\/article\/companies\/email-marketing-leader-mailchimp-hacked-customers-data-compromised-123011900384_1.html\" target=\"_blank\" rel=\"nofollow noopener\">Mailchimp<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/email-marketing-firm-hacked-to-steal-crypto-focused-mailing-lists\/\" target=\"_blank\" rel=\"noopener\">Klaviyo<\/a>, or <a href=\"https:\/\/shiftcrypto.ch\/blog\/data-breach-of-marketing-platform-activecampaign\/\" target=\"_blank\" rel=\"nofollow noopener\">ActiveCampaign<\/a>, sometimes experience these kinds of leaks. The stolen information can be used for various scams. For example, hackers that attacked Klaviyo stole lists of users interested in cryptocurrency investing. A specialized phishing tactic can then be used to target that audience and swindle them out of their crypto.<\/p>\n<h2>Protecting yourself from tracking<\/h2>\n<p>We cannot control leaks and hacks, but we can make sure that tech giants&#8217; servers collect as little data about us as possible. The tips below can be used separately or combined:<\/p>\n<ol>\n<li><strong>Block automatic loading of images in e-mail.<\/strong> When you set up e-mail on your phone, <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/block-or-unblock-automatic-picture-downloads-in-email-messages-15e08854-6808-49b1-9a0a-50b81f2d617a\" target=\"_blank\" rel=\"nofollow noopener\">computer<\/a>, or in a <a href=\"https:\/\/support.google.com\/mail\/answer\/145919?hl=en\" target=\"_blank\" rel=\"nofollow noopener\">web-based client<\/a>, make sure you enable the setting that blocks automatic image display. Most e-mail makes sense even without the pictures in it. Most e-mail clients add a &#8220;show images&#8221; button right above the e-mail body, so loading the pictures if you really need to takes just one click;<\/li>\n<li><strong>Block web trackers.<\/strong> Most web beacons can be prevented from loading. You can find <em>Private browsing<\/em> settings in <a href=\"https:\/\/usa.kaspersky.com\/premium?icid=usa_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\">Kaspersky security products<\/a>. The Firefox browser lets you enable and fine-tune <em>Enhanced Tracking Protection<\/em>. Specialized privacy plugins are available in the Chrome, Firefox and Safari catalogs of officially recommended extensions. You can find these by entering <em>privacy<\/em> or <em>tracking protection<\/em> in the search bar;<\/li>\n<li><strong>Protect your internet connection.<\/strong> Tracking protection works well at operating system or home router level. If you block web beacons on your router, they&#8217;ll stop working not just in your e-mail and on web pages, but also inside applications and even on your smart TV. To do this, we recommend that you <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-dns-private-dns-benefits\/47209\/\" target=\"_blank\" rel=\"noopener\">enable Secure DNS<\/a> in the operating system or router settings, and specify a <a href=\"https:\/\/blahdns.com\/\" target=\"_blank\" rel=\"noopener\">DNS server that blocks trackers<\/a>. A VPN connection can sometimes provide tracking protection too. If this is the handier option for you, make sure that your VPN provider does in fact offer a tracker blocking service.<\/li>\n<\/ol>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/web-beacons-explained-and-how-to-stop-them\/47281\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/02\/22060423\/web-beacons-explained-and-how-to-stop-them-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Anna Larkina| Date: Fri, 24 Feb 2023 11:14:54 +0000<\/strong><\/p>\n<p>What tracker pixels in e-mail and on websites are, and how to disable them<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[11147,28745,5897,1331,11241],"class_list":["post-21334","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-advertising","tag-beacons","tag-privacy","tag-technology","tag-tracking"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21334"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21334\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}