HOT TOPICS THE LAB THREATS BEST PRACTICES FAQ
Online Profiling

The Lowdown on Identity Theft from a Former FraudsterBy now, you’ve already heard about the dangers of sharing your personal usernames, passwords, and credit card information online without protection. But sometimes, it takes reading about how easily identity theft and credit card fraud are perpetrated to get an idea of what you’re truly up against. Read More »
- Related Stories
- How Identity Theft Works
- Do You Protect Your Wi-Fi Signal?
- Secrets of a Former Credit Card Thief
Online Privacy

What Facebook App’s Are Really Saying About You Responding to a recent investigation conducted by The Wall Street Journal, a Facebook spokesperson said the following, "Our technical systems have always been complemented by strong policy enforcement, and we will continue to rely on both to keep people in control of their information." This official response was precipitated by an eye-opening investigation on the “apps” available to Facebook members, and how they have been found to transmit information about users to dozens of advertising and Internet tracking companies. Read More »
- Related Stories
- Facebook in Privacy Breach
- Report: Facebook Apps Transmit Personal Data
- Zynga Sued for Alleged Privacy Violation
- US congressmen seek explanation from Facebook
Virtual Private Network (VPN)

Firesheep: The New Threat to Internet Session Hijacking Anyone who uses a computer must understand that powerful encryption is a necessary tool if you are conducting personal business such as online banking and shopping, social networking, and accessing open Wi-Fi networks. This week’s release of Firesheep, a browser extension that allows users to swipe other people’s online credentials with just a few clicks, brings the reliability of true encryption front and center. Just as the recent news that Google Street View vehicles were collecting personal Wi-Fi web traffic, this story is sure to flood news outlets. Read More »
- Related Stories
- Firesheep Highlights Web Privacy Problem
- Firesheep Firefox Add-On Hacks Twitter, Facebook Session Over Wi-Fi
- The Firesheep firestorm
Archive
- Political Parties Embrace Tracking Technologies
- The Virtual Private Network (VPN): Not Just for Businesses
- Online Privacy: Who’s Watching Your Every Move?
- Mainstream Media Outlets Profile New Threats to Your Online Privacy
- Internet Privacy & Your Health: Shedding Light on New Consequences
- Anonymity Online: Do You Know Who’s Watching?
- Facebook & Privacy Concerns: Are You Revealing More Than You Think?
- Google, Privacy and Unsecured Wi-Fi: What You Should Know
- Online Privacy and Your Personal Information
- Surfing the Web Anonymously: The Right Idea to Remain Secure If you think that surfing the Web anonymously is not for you, then you probably aren’t aware of the dangers that exist when you go online unprotected. Sure, you have nothing to hide, but even the most benign information can be used to create profiles of your behavior. And, if you’re not surfing the Web anonymously, cybercriminals can watch your every online move, as well as gain access to your usernames and passwords on all of your personal accounts.
In addition to these dangers, there are other reasons that you should surf the Web anonymously. For example, search engines are continuously building profiles on things that you do online. If you search for “shopping centers in san diego”, you’re probably okay if someone were to find out. But, what happens if you search for “cancer treatments in san diego” and your health insurance company finds out this information and decides to cancel your policy. Right now, no one knows who has access to your personal search information, so do the right thing and make sure that you are only surfing the Web anonymously. Surf the Web Anonymously with Anonymizer Universal.
Close [-]
The Lab
Want the latest in Internet security? Want a little insight into how we come up with the tools to help keep you protected?
Every day we're researching the latest threats to Internet security, keeping ourselves ahead of the individuals and, yes, companies out there trying to infringe upon our right to privacy. Occasionally, we come across surprising discoveries that we think everyone has the right to know. This is our place to tell the world what we've found out.
So tune in and pay attention. We have some things we think will surprise you and a ton of tips to keep you protected while you use the Internet. So go ahead, start browsing, you just might learn a thing or two.
Anonymizer encourages our engineers to conduct their own research and development projects. Each of the topics listed below are independent of Anonymizer, but reflect issues that we find relevant to Internet privacy and anonymity.
A 2009 Survey of SSL Deployment The most widely used mechanism for private communications, SSL (Secure Sockets Layer), and its successor, TLS (Transport Layer Security) are used countless times every day to secure Internet communications from eavesdroppers, and as a tool for verifying the identity of websites.
This report entails findings from a 2009 investigation into how SSL is deployed online. In addition, an explination of the methods used in collecting and processing data, and a short guide on determining what is required to use SSL with any given site is included.

Internet Threats
In today’s busy world, staying connected online is an essential part of life. Each day, as we access the Internet to conduct personal business and catch-up with friends, the dangers associated with unprotected Internet access continue to grow.
The following list demonstrates some of the types of threats that are currently being used by cybercriminals to access personal information for criminal activities. The list also includes annoying tactics that are used by online retailers to build profiles of your personal preferences and the Web sites you are visiting.
Click on each threat to learn more:
Consumer Profiling
Companies regularly create personalized profiles based on your Internet activities. By tracking and monitoring your IP address (digital footprint) each time you go online, they can form detailed profiles based solely on your past Internet activities. While this may seem little more than an annoyance, the information they compile builds over time and can be used to alter search results, the information available on a Web site, or even the goods and services available for you to view and purchase.
Search Engine Queries
Search engines such as Google, Yahoo, and MSN keep logs of all the searches performed on their sites. Their logs can track search results and target your search results based solely on your profile. In addition, this information is archived for extended periods of time, and can be accessed by third parties.
Internet Service Providers
Internet Service Providers can monitor and track all Web traffic. This information is regularly logged and maintained. Many ISPs have sold these profiles, with varying degrees of anonymization, to marketing companies. Identities can be compromised inadvertently by the personally attributable nature of this information.
Malicious Parties
Unscrupulous online entities can use IP addresses to make profiles of Web activity. If they can connect any personal information with the sites you visit, it is a first step in identity theft.
Tracking Cookies
Tracking cookies can be placed in Web browsers to track all Internet traffic and activities; cookies are often placed by advertisers and other parties to track activities on multiple sites enabling them to compile comprehensive profiles.
Man-in-the-Middle
A Man-in-the-Middle (often abbreviated MITM) attack occurs when a third party intercepts communication between two computers. The attacker can then read, monitor, record, and possibly modify any communications.
Pharming
This practice involves redirecting users to fraudulent Web sites where they are asked for personal information such as logins and passwords. Users should always make sure they are on the real Web sites they are visiting. Checking the URL to make sure that you have not been redirected to a fraudulent site is a good practice.
Evil Twins
Evil twins are tainted hotspots posing as legitimate Wi-Fi providers. They trick wireless users into connecting a laptop or PDA to a compromised network. Once users are connected, evil twins can watch all online activities and steal confidential information.
Java
Java allows another program to run inside Web pages, thus allowing a more diverse and interactive Web site. Having Java enabled on a browser can allow potentially malicious programs to be automatically downloaded to run on your computer each time you visit a Web site. Java frequently updates to patch security issues, but has been exploited on multiple occasions.
Active X
Active X, similar to Java, also allows another program to run inside a Web page, thus creating a more diverse and interactive Web site. Having Active X enabled on a browser can allow potentially malicious programs to be downloaded and run on your computer. Active X depends on the customer to decide whether or not to run an application. This creates the possibility of a user compromising their security by unknowingly allowing malicious parties to gain access to their computer.
Cybercrime
Nothing is 100% safe on the Internet, and while there are new online dangers popping up every day, there are many solutions for combating cybercrime. Learn more about fighting cybercrime.
Email Threats
Staying connected 24/7 via email is now the preferred way to communicate with friends and family. However, everyone should be aware that there are many dangers associated with sending and receiving email messages.
Click on each threat to learn more:
Unsecure Attachments
Email attachments can contain malware, viruses, or spyware, and can be disguised as other files to trick the user into opening the attachment.
Phishing
Scam artists use email to lure users to phony Web sites. They often appear legitimate, and are used to trick the user into visiting a site to gather personal information that the user may divulge.
Phony links
Emails can contain phony links that, if clicked, can trigger a malware download or lead the user to a malicious Web site.
Spam
If you use your email address regularly to sign up for online services or register with Web sites, your email account may end up being overwhelmed with unwanted spam and junk mail.
Personal Data Leakage
Email is often used intentionally or through error to distribute personal information. This information can be intercepted by a malicious party or inadvertently sent to one by mistake.
Unauthorized Access
If a malicious party obtains your email account information‚ they have all they need to login to your account to gather personal information from your inbound and outbound email folders.
Best Practices for Internet Users
In addition to the anonymity‚ identity‚ and privacy protection that Anonymizer Universal™ offers users when they go online‚ anyone who owns a computer should incorporate the following list of priorities into their daily routine to optimize online security. Following these simple best practices will help users derive all of the benefits and convenience that the online world offers.
Maintain Firewalls and Anti-Virus Protection
In addition to the benefits of Anonymizer Universal’s powerful online privacy and security protection‚ anyone who uses a computer should make sure that they also have firewall or anti-virus protection software installed. All computers should have regular scans for malware and viruses‚ and a firewall should always be used to guard against online threats.
Frequently Delete Private Data
Protect your privacy by frequently deleting private data from your browser. Removing this type of data can be done with ease. In Firefox‚ click on “Tools” and then “Options.” Select the “Privacy” tab. Under “Settings‚” you are able to customize and clear private data within the browser.
In Internet Explorer‚ just click on “Tools” and “Delete Browsing History.” You can select specific private data to remove or remove all private data.
In addition‚ there are a number of free and paid software applications available that will both clear and delete private data. Deletion is recommended for true anonymity as it overwrites the information and is not recoverable.
Clear Cookies‚ History‚ and Other Data Regularly
After using the Internet‚ clear all cookies‚ history‚ cache‚ and other data.
Only Open Emails From Trusted Sources
Do not open emails from untrusted sources. More importantly‚ never open email attachments or download files from untrusted sources.
Secure Your Home’s Wireless Network
When using a home wireless network to access the Internet‚ be sure to have security measures in place. Make sure your Wi-Fi connection is secure‚ password protected‚ and closed from others.
Read and Understand Privacy Policies
Always read the privacy policies of any Web sites before submitting personal information. If you do not understand any part of the information‚ be cautious and ask questions before proceeding.
Create Strong Passwords
Create strong passwords for all online activities; change passwords on a regular basis.
Protect Your Personal Email Addresses
Be cautious with your email address. Provide Web sites with disposable‚ anonymous email addresses rather than your true email address. This will help prevent spammers from trying to trick you into giving them your personal information. To learn more about disposable‚ anonymous email solutions‚ visit Anonymizer Nyms™.
Be Cautious on Social Networking Sites
Be very careful when divulging personal information on social networking sites. If you don’t want the world to know about it‚ don’t post it. Remember‚ it’s very hard to remove information from these sites‚ and employers sometimes use them as a tool to learn more about potential candidates for new positions.
As the Internet is now a primary source for information and personal communications, the need for Internet security and advanced software and tools is necessary to protect yourself. Learn more about internet security »
A well-rounded plan to secure your total Internet experience is necessary to fully protect yourself from the daily emerging threats in the online world.
Stay Secure OnlineFrequently Asked Questions
What is an IP address?
Just as you have a home address‚ your computer has an identifiable Internet Protocol (IP) address that identifies the origin of any Internet activities that originate from your computer. With this information‚ anyone can identify your geographical location‚ browser type‚ and other information that you want to keep secure.
What is a VPN (Virtual Private Network)?
A VPN is a network that provides secure‚ remote access to the Internet. All traffic queries are encrypted to the users desired Internet destinations‚ thus leaving no identifiable trail of Web activities. Learn More about VPN client
What is the IP Rotator?
IP Rotator is Anonymizer’s proprietary technology that provides users with a different random‚ rotating IP address every day.
What is L2TP?
L2TP stands for Layer 2 Tunneling Protocol. L2TP forms the "Virtual" and "Network" parts of the "Virtual Private Network". The "Private" part is handled by another protocol which carries L2TP‚ called IPSec.
What is IPSec?
IPSec is a protocol to add security to traffic as it travels across the Internet. This security takes two forms: authenticity (proof against tampering) and privacy (security against eavesdroppers). IPSec performs these functions on any protocol used on the Internet. IPSec has better performance than SSL‚ dramatically so in the case of VPNs.
Why is encryption important?
Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge‚ usually referred to as a key.
What does it mean when a Web site is blocked?
Many Web sites routinely block access based solely on a computer’s IP address. For example‚ U.S. IP addresses are often blocked access by China‚ Iran‚ and other foreign countries.
What is spoofing?
Web sites often use IP addresses to identify information about the people who are visiting their sites. With just this information‚ they can choose to redirect (spoof) certain IP addresses or visitors to misleading or different information.
What is consumer profiling?
Companies regularly create personalized profiles based on your Internet activities. By tracking and monitoring your IP address (digital footprint) each time you go online‚ they can form detailed profiles based solely on your past Internet activities. While this may seem little more than an annoyance‚ the information they compile builds over time and can be used to alter search results‚ the information available on a Web site‚ or even the goods and services available for you to view and purchase.
What is a digital footprint?
A digital footprint is a trail of information that allows others to see the places you visit when you are online. As each IP address is attributable to a computer‚ each time you visit a Web site‚ chat‚ email‚ or do personal business‚ you leave a “crumb trail” of activity that that be monitored and followed back to the source computer.
What is an Anonymous Proxy?
PCmag.com offers a great definition of an anonymous proxy: “A server that functions as a relay between the user and a destination Web site. It hides the IP address of the user's machine from the Web site.” Learn more about anonymous proxy surfing.
Internet Security Checklist
Complete Internet security requires more than just anti-virus and firewall protection. To stay secure from online dangers, these critical components are necessary to help keep your computer, and your personal information, safe, private, and secure.
- Enable your Firewall
- Run your Anti-Virus
- Install Software Updates
- Protect your Privacy & Identity
Learn How » - Protect your Email
Learn How »