Story image

NordVPN's top tips to help you stay savvy about your internet privacy

13 Feb 2017

Internet users are aware their movements are probably being tracked online, especially when that product they just Googled starts showing up in ads across almost every site they visit.

But a new study from iSchool says most users aren’t even aware that their private data is being told to advertising networks and third party providers which deliver targeted ads, NordVPN says.

However, when users start to realise they’re being tracked, they don’t understand what information is being collected by advertisers.

Cross-device tracking, where information from GPS coordinates, computers, tablets, smartphones, watches and IoT devices is also collected, enables advertisers to build a more complete picture for targeted advertising, but also raises more privacy and security risks.

“Online and offline factors are often combined: such as browsing history with physical location, retail purchases with watched TV programs, commute to work and vacation travel and so on,” NordVPN says.

NordVPN says online tracking might be dangerous for numerous reasons. If one member is browsing ‘privately’ on their phone, but other users on the home computer may still see advertisements based on that mobile browsing history.

“Or, worse yet, a woman who has suffered the trauma of miscarriage is often still persecuted by pregnancy ads, following her from once-visited pregnancy sites,” NordVPN says.

Data security is another major issue, as NordVPN says breaches can lead to identify theft, bank account access or medical record access. 

While many advertisers offer opt-outs for behavioural targeting, they generally don’t include information about how users are being tracked.

NordVPN gives the following tips about how internet users can minimise tracking information:

  • Delete cookies: This removes user behaviour and movement after internet sessions.
  • Use anti-tracking addons for your browser. These block third party cookies and tracking.
  • Use a VPN: This encrypts data between user devices and VPN servers. This is the safest security mechanism to ensure browsing history stays confidential.

“NordVPN has a reputation of focusing on privacy, security and having a zero logs policy, and is fast and easy to use. The developers at NordVPN have launched powerful apps for Mac, Android, iOS and Windows that are also intuitive and good-looking. The apps reroute and encrypt all Internet traffic by hiding a user’s IP address. Once Internet traffic is encrypted and real IP address is hidden, it becomes difficult to track this person.  As an added benefit, VPN users can also access geo-blocked content online,” NordVPN says. 

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.