Archive for the ‘Internet Tracking’ Category

Gotcha: This is an unrecognized computer …

November 9, 2015

If you do any banking online, you’ve probably gotten that message at one time or another.

Maybe it was when you got a new computer … or, when you used a friend’s computer to pay a bill.

You probably didn’t think much of it.

You just answered the security questions and paid your bill.

Bet you didn’t stop to wonder: How did Bank of Boise know that this wasn’t my usual computer?

Better yet, ask: How does the bank know when I am on my regular computer?

Well, now that I’ve aroused you curiosity, the answer is ….

Your computer has its own distinctive “device fingerprints” that make it identifiable on the Net as your computer.

image

I worry about stuff like this.  So, I’d thought about this one.

And, my thinking was wrong.

Here’s what’s going on …

(more…)

Gotcha: This is an unrecognized computer …

March 26, 2015

If you do any banking online, you’ve probably gotten that message at one time or another.

Maybe it was when you got a new computer … or, when you used a friend’s computer to pay a bill.

You probably didn’t think much of it.

You just answered the security questions and paid your bill.

Bet you didn’t stop to wonder: How did Bank of Boise know that this wasn’t my usual computer?

Better yet, ask: How does the bank know when I am on my regular computer?

Well, now that I’ve aroused you curiosity, the answer is ….

Your computer has its own distinctive “device fingerprints” that make it identifiable on the Net as your computer.

image

I worry about stuff like this.  So, I’d thought about this one.

And, my thinking was wrong.

Here’s what’s going on …

(more…)

Gotcha: This is an unrecognized computer …

November 25, 2014

If you do any banking online, you’ve probably gotten that message at one time or another.

Maybe it was when you got a new computer … or, when you used a friend’s computer to pay a bill.

You probably didn’t think much of it.

You just answered the security questions and paid your bill.

Bet you didn’t stop to wonder: How did Bank of Boise know that this wasn’t my usual computer?

Better yet, ask: How does the bank know when I am on my regular computer?

Well, now that I’ve aroused you curiosity, the answer is ….

Your computer has its own distinctive “device fingerprints” that make it identifiable on the Net as your computer.

image

I worry about stuff like this.  So, I’d thought about this one.

And, my thinking was wrong.

Here’s what’s going on …

(more…)

“Numbers aren’t available” … except every night

November 1, 2013

Even Jon Stewart was flabbergasted when HHS Sebelius said she didn’t know how many people had enrolled on the ObamaCare exchanges.

Zillions of site hits, but no idea how many orders were placed.

Sounded fishy to just about everybody, right?

Any online marketing program – and, no doubt about it, this is a marketing program —  tracks orders by the minute, hour, day, week, month, campaign duration.

Now, CBS reports that HHS has been getting real-time reporting  … and a daily dashboard that includes, well, enrollments.

 

image

=====

So, why would Sebelius and the CMS head lie about not knowing the numbers?

(more…)

Trax: About your credit score(s) …

August 13, 2013

While most people tend to think that they have one credit score, there are actually many different types of scores.

 

image

Here are some specifics …

(more…)

Trax: The business of credit reporting …

August 8, 2013

Everybody knows vaguely that so-called “credit bureaus” track your credit histories and report them to lenders.

 

image

Here are some specifics about credit bureaus that you might not know …

(more…)

Hacked: This time it’s personal …

July 31, 2013

Though I’ve on the case re: internet tracking, I’ve gotta admit that I’d been pretty cavalier re: identity theft on a personal level.

Not any more.

I’ve been hacked and “thieved”.

And, take it from me, it isn’t pretty.

Computer hacker

 

Here’s what happened and what I’ve learned that might help you

(more…)

Un-Gotcha: 10 ways to protect your online privacy …

June 21, 2013

Useful compilation from Forbes … some no-brainers, some new (to me).

Ranges from clearing browser cookies & history frequently to masking IP addresses.

Worth browsing.

click to view

image

* * * * *
Follow on Twitter @KenHoma              >> Latest Posts

Gotcha: This is an unrecognized computer.

June 19, 2013

If you do any banking online, you’ve probably gotten that message at one time or another.

Maybe it was when you got a new computer … or, when you used a friend’s computer to pay a bill.

You probably didn’t think much of it.

You just answered the security questions and paid your bill.

Bet you didn’t stop to wonder: How did Bank of Boise know that this wasn’t my usual computer.

Well, now that I’ve aroused you curiosity, the answer is ….

You’re computer has its own distinctive “device fingerprints” that make it identifiable on the Net as your computer.

image

I worry about stuff like this.  So, I’d thought about this one.

And, my thinking was wrong.

Here’s what’s going on …

(more…)

NetTrax: You can run, but you can’t hide …. MORE

June 14, 2013

Yesterday we posted about a company developing algorithms that comb through key factors including content of posts, and location, among others

…..  to provide a very to develop a identify and “unify social profiles” for users who may be using different names or handles on each of their social networks.

image

The post elicited strong interest and 2 replies that I want to highlight.

The first is from Niv Singer, Chief Technology Officer at Tracx … the man, and the company referenced.

(more…)

Gotcha: If you don’t smoke, why are you buying Marlboros?

June 13, 2013

Consumers are signing up to share personal data at an alarming rate via sleep monitors, pedometers and activity trackers, dietary logs, brainwave monitors, grocery and restaurant loyalty cards, credit cards, Foursquare and Facebook check-ins, photo geotagging, and other digital means.

image

As insurers, lenders, and others attempt to manage risk, they will inevitably turn alternative data sources to round out the picture of each consumer applicant –

Here are some ways that companies can (and are) using the data they collect on you.

(more…)

SpyNet: CIA goes shopping at Amazon …

June 13, 2013

And, it’s not for books … it’s for cloud computing services.

Say, what?

The WSJ reports that Amazon is vying against IBM for a $600 million contract to set up a cloud-computing system for the CIA.

image

Here are some highlights …

(more…)

NetTrax: You can run, but you can’t hide ….

June 12, 2013

Been reading a book called Big Data, Big Analytics …

Given the flap over the Feds grabbing phone and Internet info, this caught my eye.

Book quotes a guy named Niv Singer, Chief Technology Officer at Tracx, a social media intelligence software provider.

Niv says:

“It can sometimes be a real challenge to unify social profiles for a single user who may be using different names or handles on each of their social networks …

image

… so we’ve built an algorithm that combs through key factors including content of posts, and location, among others, to provide a very robust identity unification.”

Singer explained that they are combining social check-in data from Facebook, Foursquare, and similar social sites and applications over maps to show information … down to the street level where conversations are happening

Source

=====

English translation: You can run, but you can’t hide …they’ll find you.

* * * * *
Follow on Twitter @KenHoma                         >> Latest Posts

.

Pssst: What’s your pet’s name?

June 11, 2013

According to Javelin Strategy & Research … 1 in 8 onliners post their pet’s name to social media sites, even though its a fairly common challenge question used to confirm identities.

More generally, Javelin warns that consumers’ social media and mobile behaviors may be putting them at greater risk.

image

 

in 2011,  identity fraud increased by 13 percent … more than 11.6 million adults became a victim of identity fraud in the United States,

Javelin reports that “consumers are still sharing a significant amount of personal information frequently used to authenticate a consumer’s identity.”

Specifically,

  • 68 percent of people with public social media profiles shared their birthday information (with 45 percent sharing month, date and year);
  • 63 percent shared their high school name;
  • 18 percent shared their phone number;
  • 12 percent shared their pet’s name

All are prime examples of personal information a company would use to verify you

Source

The curse of the “two rogue agents in Cincinnati” defense …

June 10, 2013

Team Obama would still like us all to believe that it was just two rogue agents in Cincinnati were responsible for the IRS targeting of conservative groups.

Well, that defense seems to be working against them in the phone flap and internet snooping bruhaha.

image_thumb.png

Specifically, the President argues that his and the other branches of government provide adequate safeguards to preclude any abuse.

Well, what if tow rogue agents decide to go IRS on the security data?

Hmmm.

Peggy Noonan states the case more elegantly in her blog … here’s an excerpt …

(more…)

“No direct access to our central servers” … hmmm.

June 8, 2013

Last Thursday, the Washington Post outted the Feds Internet monitoring program Prism.

For details see the Washington Post article: NSA slides explain the PRISM data-collection program

image

On Friday, most of the Internet companies reported to be part of the Fed’s Prism monitoring program expressed outrage and denied their involvement.

Did you notice that practically all of the denials centered  on the same exact phrase:

That the companies didn’t provide the Feds withdirect access to our central servers”.

Hmmm … that raises some questions, doesn’t it?

(more…)

NetTrax Tip: Enable “private browsing” on your iPad …

May 31, 2013

A tip from Business Insider

image

* * * * *
Follow on Twitter @KenHoma            >> Latest Posts

NetTrax: What’s the fundamental difference between designer shoes and cars?

May 22, 2013

From an online retailing perspective it’s simple …

Once you buy a car you’re probably out of the market for awhile

… but once you buy a pair of designer shoes, you’re probably going to buy more of them.

image

Why does that matter to an online retailer?

(more…)