SlideShare a Scribd company logo
1 of 7
AVG.COM.AU
AVG.CO.NZ




Privacy in the Cloud – Do Not Track
Michael McKinnon, AVG (AU/NZ) Security Advisor




               An Avalanche Technology Group company
Privacy and Do Not Track

• How does “tracking” online happen?

   • Social networking buttons

   • Web analytics

   • Ad networks

• Users can take control of their privacy with AVG’s Do
  Not Track feature




                                                          2
Social Networking Buttons Tracking

Social buttons placed on various websites
could be revealing data about your visit
to the social networking site owners

Technically, how it happens…

The code for the button (usually JavaScript) is included on a
webpage, and loads from the social networking site (often setting a
third-party cookie)

The potential consequences…

Operators of social networking sites can determine which sites you
visit (relies on their privacy policies, procedures and integrity)




                                                                      3
Web Analytics Tracking

Provides website owners with metrics
and information about their visitors,
such as the type of computer they are
using and many other details

Technically, how it happens…

The (often very complex JavaScript) code for the web analytics is
included on a webpage, and reports back directly a wealth of
collected data

The potential consequences…

At the very least, the website owner who has implemented the
analytics is viewing the results; and the operators of the web
analytics service have a much larger view across different websites


                                                                      4
Ad Networks Tracking

Ad networks serve up billions upon
billions of online ads every single day
helping drive commerce online – but
at the potential risk of user data

Technically, how it happens…

A website loads script, or an iFrame from the ad network that
checks for a unique “id” cookie to identify your browser and serve
advertisements to you

The potential consequences…

You see the same ad across different websites; they may not know
who you are, but they know it’s the same person



                                                                     5
Do Not Track

www.avg.com.au/do-not-track/

AVG offers a new Do Not Track
feature that lets you articulate your
decision not to be tracked by some
websites, applications and advertising
networks

•   Web analytics
•   Social networking buttons
•   Ad networks

The feature is available in AVG
Internet Security, AVG Anti-Virus and
AVG Anti-Virus FREE




                                         6
Thank You!


            Connect with us to stay up to date with the latest
            news and information about online threats and scams.
            We also provide simple and useful security tips,
            designed to keep our community safe.

            Come and say hello!




avg.com.au                                     facebook.com/avgaunz

avg.co.nz
                                               twitter.com/avgaunz




   Copyright © 2012 AVG (AU/NZ) Pty Ltd, an Avalanche Technology Group company. All rights reserved.
                                                                                                       7

More Related Content

Viewers also liked

The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityAVG Technologies AU
 
τι ωραία τι χαρά
τι ωραία τι χαράτι ωραία τι χαρά
τι ωραία τι χαράMatina Kallitsari
 
Innovative Rural outdoor advertising Jagat creative solutions pvt.ltd.
Innovative Rural outdoor advertising Jagat creative solutions pvt.ltd.Innovative Rural outdoor advertising Jagat creative solutions pvt.ltd.
Innovative Rural outdoor advertising Jagat creative solutions pvt.ltd.Manish Bhanji
 
Scientific writing masterclass 2011
Scientific writing masterclass 2011Scientific writing masterclass 2011
Scientific writing masterclass 2011Kelly Chan
 
Cloud Native Streaming and Event-Driven Microservices
Cloud Native Streaming and Event-Driven MicroservicesCloud Native Streaming and Event-Driven Microservices
Cloud Native Streaming and Event-Driven Microservicesmarius_bogoevici
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityAVG Technologies AU
 
Summer training project report on fluctuation of indian stock market
Summer training project report on fluctuation of indian stock marketSummer training project report on fluctuation of indian stock market
Summer training project report on fluctuation of indian stock marketshailehpalrecha
 

Viewers also liked (10)

The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
τι ωραία τι χαρά
τι ωραία τι χαράτι ωραία τι χαρά
τι ωραία τι χαρά
 
Innovative Rural outdoor advertising Jagat creative solutions pvt.ltd.
Innovative Rural outdoor advertising Jagat creative solutions pvt.ltd.Innovative Rural outdoor advertising Jagat creative solutions pvt.ltd.
Innovative Rural outdoor advertising Jagat creative solutions pvt.ltd.
 
Kermit the frog
Kermit the frogKermit the frog
Kermit the frog
 
Social studies
Social studiesSocial studies
Social studies
 
Scientific writing masterclass 2011
Scientific writing masterclass 2011Scientific writing masterclass 2011
Scientific writing masterclass 2011
 
Cloud Native Streaming and Event-Driven Microservices
Cloud Native Streaming and Event-Driven MicroservicesCloud Native Streaming and Event-Driven Microservices
Cloud Native Streaming and Event-Driven Microservices
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
Summer training project report on fluctuation of indian stock market
Summer training project report on fluctuation of indian stock marketSummer training project report on fluctuation of indian stock market
Summer training project report on fluctuation of indian stock market
 
saras dairy ajmer
saras dairy ajmersaras dairy ajmer
saras dairy ajmer
 

More from AVG Technologies AU

How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!AVG Technologies AU
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Technologies AU
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeAVG Technologies AU
 

More from AVG Technologies AU (6)

How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
AVG Threat Report Q4 2012
AVG Threat Report Q4 2012AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Privacy in the Cloud - Do Not Track

  • 1. AVG.COM.AU AVG.CO.NZ Privacy in the Cloud – Do Not Track Michael McKinnon, AVG (AU/NZ) Security Advisor An Avalanche Technology Group company
  • 2. Privacy and Do Not Track • How does “tracking” online happen? • Social networking buttons • Web analytics • Ad networks • Users can take control of their privacy with AVG’s Do Not Track feature 2
  • 3. Social Networking Buttons Tracking Social buttons placed on various websites could be revealing data about your visit to the social networking site owners Technically, how it happens… The code for the button (usually JavaScript) is included on a webpage, and loads from the social networking site (often setting a third-party cookie) The potential consequences… Operators of social networking sites can determine which sites you visit (relies on their privacy policies, procedures and integrity) 3
  • 4. Web Analytics Tracking Provides website owners with metrics and information about their visitors, such as the type of computer they are using and many other details Technically, how it happens… The (often very complex JavaScript) code for the web analytics is included on a webpage, and reports back directly a wealth of collected data The potential consequences… At the very least, the website owner who has implemented the analytics is viewing the results; and the operators of the web analytics service have a much larger view across different websites 4
  • 5. Ad Networks Tracking Ad networks serve up billions upon billions of online ads every single day helping drive commerce online – but at the potential risk of user data Technically, how it happens… A website loads script, or an iFrame from the ad network that checks for a unique “id” cookie to identify your browser and serve advertisements to you The potential consequences… You see the same ad across different websites; they may not know who you are, but they know it’s the same person 5
  • 6. Do Not Track www.avg.com.au/do-not-track/ AVG offers a new Do Not Track feature that lets you articulate your decision not to be tracked by some websites, applications and advertising networks • Web analytics • Social networking buttons • Ad networks The feature is available in AVG Internet Security, AVG Anti-Virus and AVG Anti-Virus FREE 6
  • 7. Thank You! Connect with us to stay up to date with the latest news and information about online threats and scams. We also provide simple and useful security tips, designed to keep our community safe. Come and say hello! avg.com.au facebook.com/avgaunz avg.co.nz twitter.com/avgaunz Copyright © 2012 AVG (AU/NZ) Pty Ltd, an Avalanche Technology Group company. All rights reserved. 7