Microsoft

The cost of Avast’s Free Antivirus: companies can spy on your clicks

Your antivirus should protect you, but what if it’s handing over your browser history to a major marketing company? Relax. That’s what Avast told the public after its browser extensions were found harvesting users’ data to supply to marketers. Last month, the antivirus company tried to justify the practice by claiming the collected web histories…

Your antivirus should protect you, but what if it’s handing over your browser history to a major marketing company?

Relax. That’s what Avast told the public after its browser extensions were found harvesting users’ data to supply to marketers. Last month, the antivirus company tried to justify the practice by claiming the collected web histories were stripped of users’ personal details before being handed off.

“The data is fully de-identified and aggregated and cannot be used to personally identify or target you,” Avast told users, who opt in to the data sharing. In return, your privacy is preserved, Avast gets paid, and online marketers get a trove of “aggregate” consumer data to help them sell more products.

There’s just one problem: What should be a giant chunk of anonymized web history data can actually be picked apart and linked back to individual Avast users, according to a joint investigation by PCMag and VICE’s Motherboard.

How ‘De-Identification’ Can Fail

The Avast division charged with selling the data is Jumpshot, a company subsidiary that’s been offering access to user traffic from 100 million devices, including PCs and phones. In return, clients—from big brands to e-commerce providers—can learn what consumers are buying and where, whether it be from a Google or Amazon search, an ad from a news article, or a post on Instagram.

The data collected is so granular that clients can view the individual clicks users are making on their browsing sessions, including the time down to the millisecond. And while the collected data is never linked to a person’s name, email or IP address, each user history is nevertheless assigned to an identifier called the device ID, which will persist unless the user uninstalls the Avast antivirus product.

For instance, a single click can theoretically look like this:

abc123x 2019/12/01 12:03:05 Amazon.com Apple iPad Pro 10.5 – 2017 Model – 256GB, Rose Gold Add to Cart

At first glance, the click looks harmless. You can’t pin it to an exact user. That is, unless you’re Amazon.com, which could easily figure out which Amazon user bought an iPad Pro at 12:03:05 on Dec. 1, 2019. Suddenly, device ID: 123abcx is a known user. And whatever else Jumpshot has on 123abcx’s activity—from other e-commerce purchases to Google searches—is no longer anonymous.

PCMag and Motherboard learned about the details surrounding the data collection from a source familiar with Jumpshot’s products. And privacy experts we spoke to agreed the timestamp information, persistent device IDs, along with the collected URLs could be be analyzed to expose someone’s identity.

“Most of the threats posed by de-anonymization—where you are identifying people—comes from the ability to merge the information with other data,” said Gunes Acar, a privacy researcher who studies online tracking.

He points out that major companies such as Amazon, Google, and branded retailers and marketing firms can amass entire activity logs on their users. With Jumpshot’s data, the companies have another way to trace users’ digital footprints across the internet.

“Maybe the (Jumpshot) data itself is not identifying people,” Acar said. “Maybe it’s just a list of hashed user IDs and some URLs. But it can always be combined with other data from other marketers, other advertisers, who can basically arrive at the real identity.”

The ‘All Clicks Feed’

The cost of Avast's Free Antivirus: Companies can spy on your clicks

Image: PC Mag

According to internal documents, Jumpshot offers a variety of products that serve up collected browser data in different ways. For example, one product focuses on searches that people are making, including keywords used and results that were clicked.

We viewed a snapshot of the collected data, and saw logs featuring queries on mundane,

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Microsoft

Microsoft denies shutting down operations in China

Microsoft China denied it would cease operations in the country, after a screenshot of an internal email from Wicresoft, a Microsoft outsourcing partner, fueled speculation about a potential exit. On Monday, several employees of Wicresoft shared screenshots of layoff emails on social media. The email cites geopolitical tensions and shifts in the global business landscape

Microsoft China denied it would cease operations in the country, after a screenshot of an internal email from Wicresoft, a Microsoft outsourcing partner, fueled speculation about a potential exit. On Monday, several employees of Wicresoft shared screenshots of layoff emails on social media. The email cites geopolitical tensions and shifts in the global business landscape [……
Read More

Continue Reading
Microsoft

Fake Microsoft Office add-in tools push malware via SourceForge

Threat actors are abusing SourceForge to distribute fake Microsoft add-ins that install malware on victims’ computers to both mine and steal cryptocurrency. …

Threat actors are abusing SourceForge to distribute fake Microsoft add-ins that install malware on victims’ computers to both mine and steal cryptocurrency. …
Read More

Continue Reading
Microsoft

How Microsoft’s AI chief measures consumer inroads for Copilot

Advertisement Business How Microsoft’s AI chief measures consumer inroads for Copilot Microsoft AI CEO Mustafa Suleyman speaks at the company’s 50th anniversary celebration in Redmond, Washington, U.S., April 4, 2025. REUTERS/Jeffrey Dastin Microsoft AI CEO Mustafa Suleyman speaks at the company’s 50th anniversary celebration in Redmond, Washington, U.S., April 4, 2025. REUTERS/Jeffrey Dastin Microsoft co-founder

Advertisement

Business

How Microsoft’s AI chief measures consumer inroads for Copilot

05 Apr 2025 08:13AM
(Updated: 05 Apr 2025 08:28AM)



Bookmark



Bookmark



Share

REDMOND, Washington : As Microsoft CEOs past and present gathered here to celebrate the company’s 50th birthday, one leader said he is targeting a particular metric’s improvement to guide his strategy on artificial intelligence.

Mustafa Suleyman, chief executive of Microsoft AI, said his consumer and research division is tracking the usual measures of adoption for the company’s AI assistant called Copilot. These include daily and weekly active users, distribution, and usage intensity for Copilot’s consumer offering, he said.

But Suleyman’s interest lies elsewhere.

“I really, really focus the team on SSR, the rate of successful sessions,” he said in an interview.

In an older era when consumers gave less real-time feedback on software, the time they spent with a product – on social media, for instance – or the problems they could solve represented crude “proxies for quality,” he said.

“Now, we actually get to learn from the anonymized logs and extract the sentiment,” said Suleyman, who joined Microsoft about a year ago after leading the startup Inflection AI. Suleyman was one of the only Microsoft executives other than former CEOs Bill Gates and Steve Ballmer and current CEO Satya Nadella to speak on stage at Microsoft’s Friday event at its Redmond, Washington, headquarters.

Suleyman said Microsoft has tasked an AI model itself to assess such sentiment and help determine Copilot chats’ SSR.

“Over the last four months, it’s gone up dramatically, and that’s what we optimize for,” he said.

Suleyman declined to state the rate in absolute terms or disclose other Copilot metrics.

The company last fall announced a more amiable voice for its consumer Copilot and the ability to analyze web pages for users as they browse.

On Friday, Microsoft demonstrated further features for Copilot: personalized podcasts, a tool to help consumers research complex queries, and eventually a look for Copilot that can be custom to each user and conversation.

“I would definitely go for something that was cutesy,” said Suleyman, “like a little Furby-type thing.”

Source: Reuters

Advertisement

Also worth reading

Advertisement

Read More

Continue Reading
Microsoft

Microsoft Raises Alarm of Malware Targeting Coinbase, MetaMask Wallets

Tech Share Share this article Copy link X icon X (Twitter) LinkedIn Facebook Email Microsoft Raises Alarm of Malware Targeting Coinbase, MetaMask Wallets A new report from Microsoft researchers warned of malware that could steal and decrypt users’ information from 20 of some of the most popular cryptocurrency wallets. By Margaux Nijkerk| Edited by Stephen

Tech

Share this article

X iconX (Twitter)LinkedInFacebookEmail

Microsoft Raises Alarm of Malware Targeting Coinbase, MetaMask Wallets

A new report from Microsoft researchers warned of malware that could steal and decrypt users’ information from 20 of some of the most popular cryptocurrency wallets.

Microsoft shareholders voted against adding bitcoin to its company's treasury. (Photo by Craig T Fruchtman/Getty Images)

What to know:

  • Tech giant Microsoft shared a new report warning of malware that targets 20 of the most popular cryptocurrency wallets used with the Google Chrome extension.
  • The malware, dubbed StilachiRAT, could deploy “sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data.”
  • While the malware has not been distributed widely, Microsoft did share that it has not been able to identify what entity is behind the threat.

Tech giant Microsoft shared a new report warning of malware that targets 20 of the most popular cryptocurrency wallets used with the Google Chrome extension.

STORY CONTINUES BELOW
Don’t miss another story.Subscribe to the The Protocol Newsletter today. See all newsletters

Microsoft’s Incident Response researchers raised alarms of a new remote access trojan (RAT), dubbed StilachiRAT, which could deploy “sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data,” the team shared in a blog post.

According to the team, the malware was discovered in November 2024, and it could steal users’ wallet information, and any credentials, including usernames and passwords, stored in their Google Chrome browser. StilachiRAT targets 20 crypto wallets including some of the most widely-used ones like MetaMask, Coinbase Wallet, Phantom, OKX Wallet, and BNB Chain Wallet.

While the malware has not been distributed widely, Microsoft did share that it has not been able to identify what entity is behind the threat and laid out some mitigation guidelines for current targets including installing antivirus software.

“Due to its stealth capabilities and the rapid changes within the malware ecosystem, we are sharing these findings as part of our ongoing efforts to monitor, analyze, and report on the evolving threat landscape,” the team wrote.

Read more: Microsoft Shareholders Vote Down Bitcoin Treasury Proposal

MicrosoftWalletsMetaMaskPhantomcoinbase-walletCoinbase
Margaux Nijkerk

Margaux Nijkerk reports on the Ethereum protocol and L2s. A graduate of Johns Hopkins and Emory universities, she has a masters in International Affairs & Economics. She holds BTC and ETH above CoinDesk’s disclosure threshold of $1,000.

X

!–>!–>!–>
Read More

Continue Reading