Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
Cyber security experts have long warned about the dangers of cookie theft, a tactic used by hackers to bypass online security measures. Now, Google is taking decisive action with a new Chrome browser feature called Device Bound Session Credentials (DBSC). This technology aims to render stolen cookies useless, significantly reducing the success of cyber attacks.
Cookies are small text files that websites store on your device to remember your preferences, login information, and other details. While cookies are essential for a smooth online experience, they can also be exploited by cybercriminals.
Malware designed to steal cookies can infiltrate your device and swipe these valuable data snippets. Hackers then use the stolen cookies to impersonate you on websites, even if you have multi-factor authentication (MFA) enabled. This allows them to access your sensitive information, potentially leading to financial loss, identity theft, or reputational damage.
DBSC tackles this threat by cryptographically linking your online sessions to your specific device. Here’s a simplified explanation:
With this setup, the website can continually verify that requests are coming from the device that originally started the session. If a hacker steals your cookie, they won’t have the corresponding private key, making the cookie worthless on any other machine.
While DBSC offers a robust layer of defence, staying vigilant against cyber threats remains crucial. Here’s how to protect yourself:
Google’s initiative with DBSC is a significant step forward in the fight against cookie theft. As the feature becomes widely adopted, users can expect a safer online environment. However, it’s essential to remember that cybersecurity is an ongoing battle. Staying informed and practicing safe online habits will always be your best defence against evolving threats.
More reading at: