Your online activity says a lot about who you are. The people, websites, and applications you interact with may reveal your location, your profession, and even your religious or political affiliations.
If someone knows your name, they can look up these records using search engines, social media, and people search sites. That information is valuable for advertisers and marketers, but it’s worth even more to hackers and scammers.
It should come as no surprise that 47% of internet users report looking up information about themselves online. Over three-fourths of those users report finding negative results about themselves on the internet.
At the same time, employers and university admissions staff are increasingly using search engines and social media to qualify applicants. Successfully managing your digital footprint lets you control what people can learn about you online.
Not all digital footprint data is the same. There are two broad categories of digital footprints:
In many cases, this data supports useful website functionalities. For example, most websites use browser cookies to keep track of users who are signed in even if they close their browser or open new windows.
However, some website owners push that functionality too far. Third-party tracking cookies can potentially tell website owners about your activities on other websites. They may even sell this information to a data broker who will bundle it with your personal info found on other platforms and sell to the highest bidder.
The more advertisers, data brokers, and scammers know about you, the harder it is to identify genuine content online. Keeping your data private makes it harder for marketers to target you with ads and prevents hackers from creating spoofed websites that trick you into giving up your personal information.
The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has been…
AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers, suspected…
AI has recently been added to the list of things that keep cybersecurity leaders awake.…
A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave over…
The threat actor known as GOFFEE has launched a series of targeted attacks against critical…
A Cisco’s Smart Install protocol (CVE-2018-0171), first patched in 2018, remains a pervasive threat to…