Thursday, February 27, 2025
HomeCyber Security NewsOff-Facebook Activity - New Facebook Tool Let you See Which Apps and...

Off-Facebook Activity – New Facebook Tool Let you See Which Apps and Websites Tracked you

Published on

SIEM as a Service

Follow Us on Google News

Facebook introduced a new tool dubbed off-Facebook activity to control and view the apps and websites that send information to Facebook about your interest and activity.

This tracked information allows social media networks to push targeted ads based on user browsing habits.

With the new tool users, you can see hundreds of websites and apps that share the data to Facebook, with the tool you can also disconnect the data shared.

Off-Facebook Activity

Facebook has several business tools like Facebook Pixel, Facebook social plugins, and Facebook Login that let’s business to find who might be interested in their products and services.

Let’s consider a user seeing electronics products in a website that contains Facebook tracking cookies inserted, then once the user returns to Facebook they can see the same product ads within Facebook.

With the inserted session cookie the data exchanged between Facebook and the vendor website, so you will be getting the targeted ads displayed.

The new tool you can gain complete control of the data shared by the apps and websites to Facebook through business tools and you can disconnect them.

The tool is now available only in Ireland, South Korea, and Spain regions, the social media giant said in upcoming months it will be available to everyone.

How to Clear the Data?

Once the tool available in your region you can find it under the setting area of your Facebook. By navigating to your Off-Facebook Activity, you can see the list of apps that shared your activity.

Off-Facebook Activity
off-Facebook activity Tool

The tool gives you control to clear history and to turn the activity in the future for certain apps and websites.

According to Facebook, if you clear then, we’ll remove your identifying information from the data that apps and websites choose to send us. We won’t know which websites you visited or what you did there, and we won’t use any of the data you disconnect to target ads to you on Facebook, Instagram or Messenger.

The new tool is to clear the browsing history that collected outside of Facebook and its apps.

“While the technical costs for this project were high, we are glad we can give people more control over the information that businesses and organizations share with us. This tool is a first not only for us but also for the industry, which means it’s very much version 1,” Facebook said.

Sponsored:  â€“ Manage all the Endpoint networks from a single Console.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Facebook Design Flaw Allow Hackers to Remove Any Facebook User Profile Photo

Facebook has Sued Two App Developers for Click Injection Fraud Using Facebook Ads

Facebook Agreed to Pay Historic Penalty of $5 Billion & Provides New Tools For FTC To Monitor Facebook

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...