Salta al contenuto principale



Putin: 'La Russia non intende attaccare l'Europa, Ucraina nell'Ue? mai stati contrari'

ok... ma il promo problema è che l'ucraina è in europa. almeno credo. è uno stato europeo.

e poi la seconda questione: "putin non intende attaccare l'europa".

Sono sicura che in questo momento di difficoltà non abbia convenienza ad allargare il fronte. ma domani? cosa diceva dell'ucraina fino a 1 mese prima dell'invasione? che gli europei erano isterici e che mai avrebbe invaso l'ucraina

ci si può fidare? ho qualche dubbio. conviene essere credibili nella capacità di difesa? si.



Spyware, WhatsApp corregge il bug che apriva la porta agli hacker


@Informatica (Italy e non Italy 😁)
WhatsApp ha scoperto un'avanzata campagna di cyberspionaggio che ha sfruttato una serie di vulnerabilità di sicurezza nell'app nelle versioni per iOS, macOS e Android. L'app di messaggistica di proprietà di Meta ha dichiarato di aver risolto la vulnerabilità.Tutti i dettagli




Fateveli raccontare #1: Utopia - zulianis.eu/journal/fateveli-r…
Un evento dal vivo dedicato a tutti i libri che ci interessano ma non abbiamo voglia di leggere
#1


GPS Spoofing: l’attacco all’aereo di von der Leyen e la nuova frontiera della guerra ibrida


@Informatica (Italy e non Italy 😁)
Il cielo sopra Plovdiv, in Bulgaria, è diventato domenica scorsa il teatro di un episodio di hybrid warfare tanto sofisticato quanto inquietante. L’aereo che trasportava la Presidente della Commissione Europea, Ursula von der Leyen, è



Jaguar Land Rover nel mirino: l’incidente IT che conferma la crisi della sicurezza nell’automotive


@Informatica (Italy e non Italy 😁)
Jaguar Land Rover, il colosso del luxury automotive di proprietà di Tata Motors, ha ammesso pubblicamente di essere sotto attacco. Un incidente di sicurezza IT su scala globale sta mettendo in ginocchio le operazioni del



La guerra invisibile, come la Russia usa il Gps Jamming per destabilizzare l’Europa. Scrive Caruso

@Notizie dall'Italia e dal mondo

Le ricerche condotte dall’Università Marittima di Danzica in collaborazione con istituzioni tedesche e americane hanno triangolato con precisione chirurgica le origini di queste interferenze. I risultati sono inequivocabili:



Elezioni regionali, rebus a destra. Svolta in Puglia per il campo largo

ROMA – Terminata la pausa estiva, è tempo di elezioni regionali in Calabria, Campania, Marche, Puglia, Toscana, Valle d’Aosta e Veneto. Il centrodestra non ha ancora definito il volto dei…
L'articolo Elezioni regionali, rebus a destra. Svolta in Puglia per il campo largo su Lumsanews.


Israele: “Chi riconosce lo Stato di Palestina sperimenterà il terrorismo”

[quote]GAZA CITY – “I Paesi europei che si abbandonano all’ingenuità e si arrendono alle manipolazioni di Hamas finiranno per sperimentare il terrore in prima persona”. Queste le parole del ministro…
L'articolo Israele: “Chi riconosce lo Stato di Palestina



Stop alle rotte visibili dei voli di Stato dopo il caso von der Leyen

Schermare per sicurezza i voli di Stato italiani. È il progetto del governo dopo il caso delle interferenze al gps dell’aereo con a bordo la presidente della Commissione europea Ursula…
L'articolo Stop alle rotte visibili dei voli di Stato dopo il caso von der Leyen su Lumsanews.


Debutto con polemiche per il semestre filtro a Medicina. Studenti contro Bernini

[quote]ROMA – Qualcuno ha già in mente un piano B. Qualche altro, incrociando le dita, ha deciso di puntare tutto sul nuovo sistema di accesso senza il test. Quasi tutti,…
L'articolo Debutto con polemiche per il semestre filtro a Medicina. Studenti contro Bernini su



Record Ue, spesi 343 miliardi per la difesa nel 2024, +19% rispetto al 2023

BRUXELLES – Nel 2024 la spesa per la difesa dei 27 Stati membri dell’Unione Europea ha raggiunto la cifra record di 343 miliardi di euro. Un aumento del 19 per…
L'articolo Record Ue, spesi 343 miliardi per la difesa nel 2024, +19% rispetto al 2023 su Lumsanews.


Un gruppo di hacker russi al lavoro per interferire sui GPS degli aerei. Sullo sfondo, l'aereo della Bomber Leyen in atterraggio. Da notare la configurazione dell'aereo dovuta dal fatto che il pilota sta consultando Google Earth e il copilota la Via Michelin.


Questa è la democrazia e la volontà di pace tanto sponsorizzata anche dal presidente italiano, dichiarando che l'UE è un modello di pace....


Presentazione


Buongiorno a tutti,

Sono Erika, sto muovendo i primi passi nel fediverso -con non poche difficoltà-.

Sto cercando di capire dove io intenda collocarmi e ammetto di aver aperto un’infinità di profili su vari server, sicuramente sbagliando l’approccio.

Magari qualcuno può illustrarmi qualche possibilità per muovermi meglio nella rete.

Utilizzavo Instagram per educazione personale su temi come: trasfemminismo, politica nazionale ed internazionale, informazione indipendente, scienza ed altro. Avevo un podcast di lettura ad alta voce di fiabe della tradizione con musiche originali, sto cercando un luogo dove rilocarlo dopo aver lasciato spotify. Cucio robe e tento di farne un lavoro.
Erika

in reply to Unamammaincampagna

Approfitto anche per condividere con te degli appunti su una questione che riguarda i post Friendica con il titolo (come quello che hai pubblicato tu)

Formattazione post con titolo leggibili da Mastodon

Come forse saprai già, con Friendica possiamo scegliere di scrivere post con il titolo (come su WordPress) e post senza titolo (come su Mastodon). Uno dei problemi più fastidiosi per chi desidera scrivere post con il titolo è il fatto che gli utenti Mastodon leggeranno il tuo post come se fosse costituito dal solo titolo e, due a capi più in basso, dal link al post originale: questo non è di certo il modo miglior per rendere leggibili e interessanti i tuoi post!

Gli utenti Mastodon infatti hanno molti limiti di visualizzazione, ma sono pur sempre la comunità più grande del Fediverso e perciò è importante che vedano correttamente i vostri post: poter contare sulla loro visibilità è un'opportunità per aggiungere ulteriori possibilità di interazioni con altre persone.

Fortunatamente, con le ultime release di Friendica abbiamo la possibilità di modificare un'impostazione per rendere perfettamente leggibili anche i post con il titolo. Ecco come fare:

A) dal proprio account bisogna andare alla pagina delle impostazioni e, da lì, alla voce "Social Network" al link poliverso.org/settings/connect…
B) Selezionando la prima sezione "Impostazione media sociali" e scorrendo in basso si può trovare la voce "Article Mode", con un menu a cascataC) Delle tre voci disponibili bisogna scegliere "Embed the title in the body"

Ecco che adesso i nostri post saranno completamente leggibili da Mastodon!

informapirata ⁂ reshared this.

in reply to Signor Amministratore ⁂

@Signor Amministratore ⁂ Buongiorno, sto studiando tutto 😀 ti ringrazio molto. Ho finalmente cominciato a capire come muovermi! Primo passo: passare alla visualizzazione da PC. Gran parte della confusione era imputabile alle ridotte dimensioni de mio schermo.
in reply to Unamammaincampagna

@Unamammaincampagna benvenuta, anch'io da poco qui e ho avuto ed ho ancora anch'io un po' di difficoltà di ambientamento che sto dipanando poco a poco a suon anche di errori (tra parentesi) dovuti soprattutto all'impeto e alla poca pazienza. Ho già girato qualche piattaforma del fediverso, facendo anche errori grossolani di valutazione. Al momento ho sia un account qui che su diaspora (un po' più di nicchia), quindi capisco le tue impressioni.
Ci vuole solo un po' di pazienza, ma l'ambiente è sicuramente più sano di quello dei social centralizzati tradizionali (facebook, instagram, ecc).


Cina, Russia e India serrano i ranghi contro il bullismo globale di Washington


@Notizie dall'Italia e dal mondo
La Cina tiene banco al vertice dell'Organizzazione per la Sicurezza di Shanghai, riunendo le potenze emergenti all'insegna della difesa del multilateralismo e del contrasto alle minacce e alle ingerenze statunitensi
L'articolo Cina, Russia e India serrano



La Rivolta Maji Maji nell’Africa Orientale Tedesca

@Arte e Cultura

Introduzione Tra il 1905 e il 1907, nell’Africa orientale tedesca — l’odierna Tanzania continentale — prese forma una delle più vaste e complesse insurrezioni anticoloniali dell’Africa moderna: la rivolta dei Maji Maji.



La Gallery di Agosto


Ecco un po’ di foto dalle nostre Cellule Coscioni in giro per l’Italia: soggetto di questo mese, il ciclo di eventi “Una dose di realtà” su salute mentale e psichedelici, che si sono svolti in Sardegna. Clicca sull’icona della macchina fotografica per scorrere le foto!

L'articolo La Gallery di Agosto proviene da Associazione Luca Coscioni.



Cookies and how to bake them: what they are for, associated risks, and what session hijacking has to do with it


When you visit almost any website, you’ll see a pop-up asking you to accept, decline, or customize the cookies it collects. Sometimes, it just tells you that cookies are in use by default. We randomly checked 647 websites, and 563 of them displayed cookie notifications. Most of the time, users don’t even pause to think about what’s really behind the banner asking them to accept or decline cookies.

We owe cookie warnings to the adoption of new laws and regulations, such as GDPR, that govern the collection of user information and protection of personal data. By adjusting your cookie settings, you can minimize the amount of information collected about your online activity. For example, you can decline to collect and store third-party cookies. These often aren’t necessary for a website to function and are mainly used for marketing and analytics. This article explains what cookies are, the different types, how they work, and why websites need to warn you about them. We’ll also dive into sensitive cookies that hold the Session ID, the types of attacks that target them, and ways for both developers and users to protect themselves.

What are browser cookies?


Cookies are text files with bits of data that a web server sends to your browser when you visit a website. The browser saves this data on your device and sends it back to the server with every future request you make to that site. This is how the website identifies you and makes your experience smoother.

Let’s take a closer look at what kind of data can end up in a cookie.

First, there’s information about your actions on the site and session parameters: clicks, pages you’ve visited, how long you were on the site, your language, region, items you’ve added to your shopping cart, profile settings (like a theme), and more. This also includes data about your device: the model, operating system, and browser type.

Your sign-in credentials and security tokens are also collected to identify you and make it easier for you to sign in. Although it’s not recommended to store this kind of information in cookies, it can happen, for example, when you check the “Remember me” box. Security tokens can become vulnerable if they are placed in cookies that are accessible to JS scripts.

Another important type of information stored in cookies that can be dangerous if it falls into the wrong hands is the Session ID: a unique code assigned to you when you visit a website. This is the main target of session hijacking attacks because it allows an attacker to impersonate the user. We’ll talk more about this type of attack later. It’s worth noting that a Session ID can be stored in cookies, or it can even be written directly into the URL of the page if the user has disabled cookies.

Example of a Session ID as displayed in the Firefox browser's developer panel
Example of a Session ID as displayed in the Firefox browser’s developer panel

Example of a Session ID as seen in a URL address: example.org/?account.php?osCsid=dawnodpasb<...>abdisoa.

Besides the information mentioned above, cookies can also hold some of your primary personal data, such as your phone number, address, or even bank card details. They can also inadvertently store confidential company information that you’ve entered on a website, including client details, project information, and internal documents.

Many of these data types are considered sensitive. This means if they are exposed to the wrong people, they could harm you or your organization. While things like your device type and what pages you visited aren’t typically considered confidential, they still create a detailed profile of you. This information could be used by attackers for phishing scams or even blackmail.

Main types of cookies

Cookies by storage time


Cookies are generally classified based on how long they are stored. They come in two main varieties: temporary and persistent.

Temporary, or session cookies, are used during a visit to a website and deleted as soon as you leave. They save you from having to sign in every time you navigate to a new page on the same site or to re-select your language and region settings. During a single session, these values are stored in a cookie because they ensure uninterrupted access to your account and proper functioning of the site’s features for registered users. Additionally, temporary cookies include things like entries in order forms and pages you visited. This information can end up in persistent cookies if you select options like “Remember my choice” or “Save settings”. It’s important to note that session cookies won’t get deleted if you have your browser set to automatically restore your previous session (load previously opened tabs). In this case, the system considers all your activity on that site as one session.

Persistent cookies, unlike temporary ones, stick around even after you leave the site. The website owner sets an expiration date for them, typically up to a year. You can, however, delete them at any time by clearing your browser’s cookies. These cookies are often used to store sign-in credentials, phone numbers, addresses, or payment details. They’re also used for advertising to determine your preferences. Sensitive persistent cookies often have a special attribute HttpOnly. This prevents your browser from accessing their contents, so the data is sent directly to the server every time you visit the site.

Notably, depending on your actions on the website, credentials may be stored in either temporary or persistent cookies. For example, when you simply navigate a site, your username and password might be stored in session cookies. But if you check the “Remember me” box, those same details will be saved in persistent cookies instead.

Cookies by source


Based on the source, cookies are either first-party or third-party. The former are created and stored by the website, and the latter, by other websites. Let’s take a closer look at these cookie types.

First-party cookies are generally used to make the site function properly and to identify you as a user. However, they can also perform an analytics or marketing function. When this is the case, they are often considered optional – more on this later – unless their purpose is to track your behavior during a specific session.

Third-party cookies are created by websites that the one you’re visiting is talking to. The most common use for these is advertising banners. For example, a company that places a banner ad on the site can use a third-party cookie to track your behavior: how many times you click on the ad and so on. These cookies are also used by analytics services like Google Analytics or Yandex Metrica.

Social media cookies are another type of cookies that fits into this category. These are set by widgets and buttons, such as “Share” or “Like”. They handle any interactions with social media platforms, so they might store your sign-in credentials and user settings to make those interactions faster.

Cookies by importance


Another way to categorize cookies is by dividing them into required and optional.

Required or essential cookies are necessary for the website’s basic functions or to provide the service you’ve specifically asked for. This includes temporary cookies that track your activity during a single visit. It also includes security cookies, such as identification cookies, which the website uses to recognize you and spot any fraudulent activity. Notably, cookies that store your consent to save cookies may also be considered essential if determined by the website owner, since they are necessary to ensure the resource complies with your chosen privacy settings.

The need to use essential cookies is primarily relevant for websites that have a complex structure and a variety of widgets. Think of an e-commerce site that needs a shopping cart and a payment system, or a photo app that has to save images to your device.

A key piece of data stored in required cookies is the above-mentioned Session ID, which helps the site identify you. If you don’t allow this ID to be saved in a cookie, some websites will put it directly in the page’s URL instead. This is a much riskier practice because URLs aren’t encrypted. They’re also visible to analytics services, tracking tools, and even other users on the same network as you, which makes them vulnerable to cross-site scripting (XSS) attacks. This is a major reason why many sites won’t let you disable required cookies for your own security.

Example of required cookies on the Osano CMP website
Example of required cookies on the Osano CMP website

Optional cookies are the ones that track your online behavior for marketing, analytics, and performance. This category includes third-party cookies created by social media platforms, as well as performance cookies that help the website run faster and balance the load across servers. For instance, these cookies can track broken links to improve a website’s overall speed and reliability.

Essentially, most optional cookies are third-party cookies that aren’t critical for the site to function. However, the category can also include some first-party cookies for things like site analytics or collecting information about your preferences to show you personalized content.

While these cookies generally don’t store your personal information in readable form, the data they collect can still be used by analytics tools to build a detailed profile of you with enough identifying information. For example, by analyzing which sites you visit, companies can make educated guesses about your age, health, location, and much more.

A major concern is that optional cookies can sometimes capture sensitive information from autofill forms, such as your name, home address, or even bank card details. This is exactly why many websites now give you the choice to accept or decline the collection of this data.

Special types of cookies


Let’s also highlight special subtypes of cookies managed with the help of two similar technologies that enable non-standard storage and retrieval methods.

A supercookie is a tracking technology that embeds cookies into website headers and stores them in non-standard locations, such as HTML5 local storage, browser plugin storage, or browser cache. Because they’re not in the usual spot, simply clearing your browser’s history and cookies won’t get rid of them.

Supercookies are used for personalizing ads and collecting analytical data about the user (for example, by internet service providers). From a privacy standpoint, supercookies are a major concern. They’re a persistent and hard-to-control tracking mechanism that can monitor your activity without your consent, which makes it tough to opt out.

Another unusual tracking method is Evercookie, a type of zombie cookie. Evercookies can be recovered with JavaScript even after being deleted. The recovery process relies on the unique user identifier (if available), as well as traces of cookies stored across all possible browser storage locations.

How cookie use is regulated


The collection and management of cookies are governed by different laws around the world. Let’s review the key standards from global practices.

  1. General Data Protection Regulation (GDPR) and ePrivacy Directive (Cookie Law) in the European Union.
    Under EU law, essential cookies don’t require user consent. This has created a loophole for some websites. You might click “Reject All”, but that button might only refuse non-essential cookies, allowing others to still be collected.
  2. Lei Geral de Proteção de Dados Pessoais (LGPD) in Brazil.
    This law regulates the collection, processing, and storage of user data within Brazil. It is largely inspired by the principles of GDPR and, similarly, requires free, unequivocal, and clear consent from users for the use of their personal data. However, LGPD classifies a broader range of information as personal data, including biometric and genetic data. It is important to note that compliance with GDPR does not automatically mean compliance with LGPD, and vice versa.
  3. California Consumer Privacy Act (CCPA) in the United States.
    The CCPA considers cookies a form of personal information. This means their collection and storage must follow certain rules. For example, any California resident has the right to stop cross-site cookie tracking to prevent their personal data from being sold. Service providers are required to give users choices about what data is collected and how it’s used.
  4. The UK’s Privacy and Electronic Communications Regulations (PECR, or EC Directive) are similar to the Cookie Law.
    PECR states that websites and apps can only save information on a user’s device in two situations: when it’s absolutely necessary for the site to work or provide a service, or when the user has given their explicit consent to this.
  5. Federal Law No. 152-FZ “On Personal Data” in Russia.
    The law broadly defines personal data as any information that directly or indirectly relates to an individual. Since cookies can fall under this definition, they can be regulated by this law. This means websites must get explicit consent from users to process their data.

In Russia, website owners must inform users about the use of technical cookies, but they don’t need to get consent to collect this information. For all other types of cookies, user consent is required. Often, the user gives this consent automatically when they first visit the site, as it’s stated in the default cookie warning.

Some sites use a banner or a pop-up window to ask for consent, and some even let users choose exactly which cookies they’re willing to store on their device.

Beyond these laws, website owners create their own rules for using first-party cookies. Similarly, third-party cookies are managed by the owners of third-party services, such as Google Analytics. These parties decide what kind of information goes into the cookies and how it’s formatted. They also determine the cookies’ lifespan and security settings. To understand why these settings are so important, let’s look at a few ways malicious actors can attack one of the most critical types of cookies: those that contain a Session ID.

Session hijacking methods


As discussed above, cookies containing a Session ID are extremely sensitive. They are a prime target for cybercriminals. In real-world attacks, different methods for stealing a Session ID have been documented. This is a practice known as session hijacking. Below, we’ll look at a few types of session hijacking.

Session sniffing


One method for stealing cookies with a Session ID is session sniffing, which involves intercepting traffic between the user and the website. This threat is a concern for websites that use the open HTTP protocol instead of HTTPS, which encrypts traffic. With HTTP, cookies are transmitted in plain text within the headers of HTTP requests, which makes them vulnerable to interception.

Attacks targeting unencrypted HTTP traffic mostly happen on public Wi-Fi networks, especially those without a password and strong security protocols like WPA2 or WPA3. These protocols use AES encryption to protect traffic on Wi-Fi networks, with WPA3 currently being the most secure version. While WPA2/WPA3 protection limits the ability to intercept HTTP traffic, only implementing HTTPS can truly protect against session sniffing.

This method of stealing Session ID cookies is fairly rare today, as most websites now use HTTPS encryption. The popularity of this type of attack, however, was a major reason for the mass shift to using HTTPS for all connections during a user’s session, known as HTTPS everywhere.

Cross-site scripting (XSS)


Cross-site scripting (XSS) exploits vulnerabilities in a website’s code to inject a malicious script, often written in JavaScript, onto its webpages. This script then runs whenever a victim visits the site. Here’s how an XSS attack works: an attacker finds a vulnerability in the source code of the target website that allows them to inject a malicious script. For example, the script might be hidden in a URL parameter or a comment on the page. When the user opens the infected page, the script executes in their browser and gains access to the site’s data, including the cookies that contain the Session ID.

Session fixation


In a session fixation attack, the attacker tricks your browser into using a pre-determined Session ID. Thus, the attacker prepares the ground for intercepting session data after the victim visits the website and performs authentication.

Here’s how it goes down. The attacker visits a website and gets a valid, but unauthenticated, Session ID from the server. They then trick you into using that specific Session ID. A common way to do this is by sending you a link with the Session ID already embedded in the URL, like this: http://example.com/?SESSIONID=ATTACKER_ID. When you click the link and sign in, the website links the attacker’s Session ID to your authenticated session. The attacker can then use the hijacked Session ID to take over your account.

Modern, well-configured websites are much less vulnerable to session fixation than XSS-like attacks because most current web frameworks automatically change the user’s Session ID after they sign in. However, the very existence of this Session ID exploitation attack highlights how crucial it is for websites to securely manage the entire lifecycle of the user session, especially at the moment of sign-in.

Cross-site request forgery (CSRF)


Unlike session fixation or sniffing attacks, cross-site request forgery (CSRF or XSRF) leverages the website’s trust in your browser. The attacker forces your browser, without your knowledge, to perform an unwanted action on a website where you’re signed in – like changing your password or deleting data.

For this type of attack, the attacker creates a malicious webpage or an email message with a harmful link, piece of HTML code, or script. This code contains a request to a vulnerable website. You open the page or email message, and your browser automatically sends the hidden request to the target site. The request includes the malicious action and all the necessary (for example, temporary) cookies for that site. Because the website sees the valid cookies, it treats the request as a legitimate one and executes it.

Variants of the man-in-the-middle (MitM) attack


A man-in-the-middle (MitM) attack is when a cybercriminal not only snoops on but also redirects all the victim’s traffic through their own systems, thus gaining the ability to both read and alter the data being transmitted. Examples of these attacks include DNS spoofing or the creation of fake Wi-Fi hotspots that look legitimate. In an MitM attack, the attacker becomes the middleman between you and the website, which gives them the ability to intercept data, such as cookies containing the Session ID.

Websites using the older HTTP protocol are especially vulnerable to MitM attacks. However, sites using the more secure HTTPS protocol are not entirely safe either. Malicious actors can try to trick your browser with a fake SSL/TLS certificate. Your browser is designed to warn you about suspicious invalid certificates, but if you ignore that warning, the attacker can decrypt your traffic. Cybercriminals can also use a technique called SSL stripping to force your connection to switch from HTTPS to HTTP.

Predictable Session IDs


Cybercriminals don’t always have to steal your Session ID – sometimes they can just guess it. They can figure out your Session ID if it’s created according to a predictable pattern with weak, non-cryptographic characters. For example, a Session ID may contain your IP address or consecutive numbers, and a weak algorithm that uses easily predictable random sequences may be used to generate it.

To carry out this type of attack, the malicious actor will collect a sufficient number of Session ID examples. They analyze the pattern to figure out the algorithm used to create the IDs, then apply that knowledge to predicting your current or next Session ID.

Cookie tossing


This attack method exploits the browser’s handling of cookies set by subdomains of a single domain. If a malicious actor takes control of a subdomain, they can try to manipulate higher-level cookies, in particular the Session ID. For example, if a cookie is set for sub.domain.com with the Domain attribute set to .domain.com, that cookie will also be valid for the entire domain.

This lets the attacker “toss” their own malicious cookies with the same names as the main domain’s cookies, such as Session_id. When your browser sends a request to the main server, it includes all the relevant cookies it has. The server might mistakenly process the hacker’s Session ID, giving them access to your user session. This can work even if you never visited the compromised subdomain yourself. In some cases, sending invalid cookies can also cause errors on the server.

How to protect yourself and your users


The primary responsibility for cookie security rests with website developers. Modern ready-made web frameworks generally provide built-in defenses, but every developer should understand the specifics of cookie configuration and the risks of a careless approach. To counter the threats we’ve discussed, here are some key recommendations.

Recommendations for web developers


All traffic between the client and server must be encrypted at the network connection and data exchange level. We strongly recommend using HTTPS and enforcing automatic redirect from HTTP to HTTPS. For an extra layer of protection, developers should use the HTTP Strict Transport Security (HSTS) header, which forces the browser to always use HTTPS. This makes it much harder, and sometimes impossible, for attackers to slip into your traffic to perform session sniffing, MitM, or cookie tossing attacks.

It must be mentioned that the use of HTTPS is insufficient protection against XSS attacks. HTTPS encrypts data during transmission, while an XSS script executes directly in the user’s browser within the HTTPS session. So, it’s up to the website owner to implement protection against XSS attacks. To stop malicious scripts from getting in, developers need to follow secure coding practices:

  • Validate and sanitize user input data.
  • Implement mandatory data encoding (escaping) when rendering content on the page – this way, the browser will not interpret malicious code as part of the page and will not execute it.
  • Use the HttpOnly flag to protect cookie files from being accessed by the browser.
  • Use the Content Security Policy (CSP) standard to control code sources. It allows monitoring which scripts and other content sources are permitted to execute and load on the website.

For attacks like session fixation, a key defense is to force the server to generate a new Session ID right after the user successfully signs in. The website developer must invalidate the old, potentially compromised Session ID and create a new one that the attacker doesn’t know.

An extra layer of protection involves checking cookie attributes. To ensure protection, it is necessary to check for the presence of specific flags (and set them if they are missing): Secure and HttpOnly. The Secure flag ensures that cookies are transmitted over an HTTPS connection, while HttpOnly prevents access to them from the browser, for example through scripts, helping protect sensitive data from malicious code. Having these attributes can help protect against session sniffing, MitM, cookie tossing, and XSS.

Pay attention to another security attribute, SameSite, which can restrict cookie transmission. Set it to Lax or Strict for all cookies to ensure they are sent only to trusted web addresses during cross-site requests and to protect against CSRF attacks. Another common strategy against CSRF attacks is to use a unique, randomly generated CSRF token for each user session. This token is sent to the user’s browser and must be included in every HTTP request that performs an action on your site. The site then checks to make sure the token is present and correct. If it’s missing or doesn’t match the expected value, the request is rejected as a potential threat. This is important because if the Session ID is compromised, the attacker may attempt to replace the CSRF token.

To protect against an attack where a cybercriminal tries to guess the user’s Session ID, you need to make sure these IDs are truly random and impossible to predict. We recommend using a cryptographically secure random number generator that utilizes powerful algorithms to create hard-to-predict IDs. Additional protection for the Session ID can be ensured by forcing its regeneration after the user authenticates on the web resource.

The most effective way to prevent a cookie tossing attack is to use cookies with the __Host- prefix. These cookies can only be set on the same domain that the request originates from and cannot have a Domain attribute specified. This guarantees that a cookie set by the main domain can’t be overwritten by a subdomain.

Finally, it’s crucial to perform regular security checks on all your subdomains. This includes monitoring for inactive or outdated DNS records that could be hijacked by an attacker. We also recommend ensuring that any user-generated content is securely isolated on its own subdomain. User-generated data must be stored and managed in a way that prevents it from compromising the security of the main domain.

As mentioned above, if cookies are disabled, the Session ID can sometimes get exposed in the website URL. To prevent this, website developers must embed this ID into essential cookies that cannot be declined.

Many modern web development frameworks have built-in security features that can stop most of the attack types described above. These features make managing cookies much safer and easier for developers. Some of the best practices include regular rotation of the Session ID after the user signs in, use of the Secure and HttpOnly flags, limiting the session lifetime, binding it to the client’s IP address, User-Agent string, and other parameters, as well as generating unique CSRF tokens.

There are other ways to store user data that are both more secure and better for performance than cookies.

Depending on the website’s needs, developers can use different tools, like the Web Storage API (which includes localStorage and sessionStorage), IndexedDB, and other options. When using an API, data isn’t sent to the server with every single request, which saves resources and makes the website perform better.

Another exciting alternative is the server-side approach. With this method, only the Session ID is stored on the client side, while all the other data stays on the server. This is even more secure than storing data with the help of APIs because private information is never exposed on the client side.

Tips for users


Staying vigilant and attentive is a big part of protecting yourself from cookie hijacking and other malicious manipulations.

Always make sure the website you are visiting is using HTTPS. You can check this by looking at the beginning of the website address in the browser address bar. Some browsers let the user view additional website security details. For example, in Google Chrome, you can click the icon right before the address.

This will show you if the “Connection is secure” and the “Certificate is valid”. If these details are missing or data is being sent over HTTP, we recommend maximum caution when visiting the website and, whenever possible, avoiding entering any personal information, as the site does not meet basic security standards.

When browsing the web, always pay attention to any security warnings your browser gives you, especially about suspicious or invalid certificates. Seeing one of these warnings might be a sign of an MitM attack. If you see a security warning, it’s best to stop what you’re doing and leave that website right away. Many browsers implement certificate verification and other security features, so it is important to install browser updates promptly – this replaces outdated and compromised certificates.

We also recommend regularly clearing your browser data (cookies and cache). This can help get rid of outdated or potentially compromised Session IDs.

Always use two-factor authentication wherever it’s available. This makes it much harder for a malicious actor to access your account, even if your Session ID is exposed.

When a site asks for your consent to use cookies, the safest option is to refuse all non-essential ones, but we’ll reiterate that sometimes, clicking “Reject cookies” only means declining the optional ones. If this option is unavailable, we recommend reviewing the settings to only accept the strictly necessary cookies. Some websites offer this directly in the pop-up cookie consent notification, while others provide it in advanced settings.

The universal recommendation to avoid clicking suspicious links is especially relevant in the context of preventing Session ID theft. As mentioned above, suspicious links can be used in what’s known as session fixation attacks. Carefully check the URL: if it contains parameters you do not understand, we recommend copying the link into the address bar manually and removing the parameters before loading the page. Long strings of characters in the parameters of a legitimate URL may turn out to be an attacker’s Session ID. Deleting it renders the link safe. While you’re at it, always check the domain name to make sure you’re not falling for a phishing scam.

In addition, we advise extreme caution when connecting to public Wi-Fi networks. Man-in-the-middle attacks often happen through open networks or rogue Wi-Fi hotspots. If you need to use a public network, never do it without a virtual private network (VPN), which encrypts your data and makes it nearly impossible for anyone to snoop on your activity.


securelist.com/cookies-and-ses…



Remembering the Intel Compute Stick


Over the years Intel has introduced a number of new computer form factors that either became a hit, fizzled out, or moved on to live a more quiet life. The New Unit of Computing (NUC) decidedly became a hit with so-called Mini PCs now everywhere, while the Intel Compute Stick has been largely forgotten. In a recent video by the [Action Retro] one such Compute Stick is poked at, specifically the last model released by Intel in the form of the 2016-era STK1AW32SC, featuring a quad-core Intel Atom x5-Z8330 SoC, 2 GB of RAM and 32 GB eMMC storage.

As the name suggests, this form factor is very stick-like, with a design that makes it easy to just plug it into the HDMI port of a display, making it a snap to add a computer to any TV or such without taking up a considerable amount of space. Although Intel didn’t make more of them after this model, it could be argued that devices like the Chromecast dongle follow the same general concept, and manufacturers like MeLe are still making new PCs in this form factor today.

In the video this 2016-era Compute Stick is put through its paces, wiping the Windows 10 installation that was still on it from the last time it was used, and an installation of Haiku was attempted which unfortunately failed to see the eMMC storage. Worse was the current Ubuntu, which saw its installer simply freeze up, but MX Linux saved the day, providing a very usable Linux desktop experience including the watching of YouTube content and network streaming of Steam games.

Although dissed as ‘e-waste’ by many today, if anything this video shows that these little sticks are still very capable computers in 2025.

youtube.com/embed/G3WvOzdlpwY?…


hackaday.com/2025/09/02/rememb…



Hikvision: Hersteller der Hamburger KI-Überwachungskameras ist für Menschenrechtsverletzungen bekannt


netzpolitik.org/2025/hikvision…

reshared this



Age verification gains traction: the EU risks failing to address the root causes of online harm


Narratives around age verification and restriction of access for minors are gaining traction in the EU, amid similar efforts being pursued in the UK, US and Australia. This blog analyses different EU policy files and warns that relying on age-gating risks undermining more holistic, rights-respecting and effective solutions to online harm.

The post Age verification gains traction: the EU risks failing to address the root causes of online harm appeared first on European Digital Rights (EDRi).



Gene Clark – il Byrd che volò da solo
freezonemagazine.com/rubriche/…
Un musicista poco più che diciottenne suona nel gruppo folk tradizionalista dei New Christy Minstrels e dopo un concerto in una città della Virginia, decide di abbandonare i compagni e si infila in un taxi. Il conducente è un giovane come lui e quando la conversazione tra i due cade sulla musica non parlano di […]
L'articolo Gene Clark – il Byrd che volò da solo proviene da FREE


Videogiochi, il colosso cinese NetEase chiude studi in Occidente

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Il colosso asiatico NetEase continua a licenziare e a chiudere studi occidentali: con l'ultima mossa ha detto addio a un team fondato appena due anni fa che non aveva ancora sviluppato il suo primo videogame. Dopo anni di shopping ed

[AF]2050 reshared this.



Hanno abbandonato un veicolo e sospetto sia rubato.

Ho provato (da 3 browser diversi) a verificare sul sito della Polizia di Stato ma mi risulta impossibile.

poliziadistato.it/articolo/con…

A voi funziona?






LATINOAMERICA. La rubrica mensile di Pagine Esteri


@Notizie dall'Italia e dal mondo
Le notizie più rilevanti del mese di agosto dall’America centrale e meridionale, a cura di Geraldina Colotti
L'articolo LATINOAMERICA. La rubrica mensile di Pagine Esteri proviene da Pagine Esteri.

pagineesteri.it/2025/09/02/med…



La Carta di Assisi dei bambini presentata a Castiglioncello


@Giornalismo e disordine informativo
articolo21.org/2025/09/la-cart…
Il Festival di art 21 a Castiglioncello si è chiuso domenica 31 agosto con “Le parole sono pietre?”, incontro incentrato sulla presentazione de La Carta di Assisi per i ragazzi e i bambini,



Il capo di Stato maggiore dell'esercito si scontra con il governo e avverte: "State andando verso un governo militare".

Siamo al punto che persino l'esercito gli dice che sta esagerando.

rainews.it/video/2025/09/gaza-…



La barbarie di Israele


@Giornalismo e disordine informativo
articolo21.org/2025/09/la-barb…
Non è nostra abitudine coinvolgere un intero popolo nelle decisioni del suo governo (anche perché, se il criterio dovesse essere applicato a noi italiani, potremmo incappare in spiacevoli sorprese); fatto sta che, di fronte alla sostanziale acquiescenza degli israeliani nei confronti di Netanyahu e

reshared this




Boston City Council stops BPD surveillance effort


Thanks to everyone who came out to oppose the Boston Police Department’s (BPD) request for City Council approval for BPD to use three new social media surveillance tools. Because of your effort, the City Council voted against this proposal. The BPD started using these tools claiming “exigent circumstances” months before asking for approval.

We know that any tool BPD uses will feed into the Boston Regional Information Center (BRIC) and Federal agencies such as ICE, CBP and the FBI. Those tools will be used to spy on and abuse people who are doing nothing wrong. We are happy that the Boston City Council agreed.

Councilors Breadon (District 9), Louijeune (At large), Mejia (At large), Pepén (District 5), Weber (District 6) and Worrell (District 4) voted to reject the report, sending it to an oversight board that will assess whether Boston Police overstepped the surveillance ordinance. Councilors Durkan (District 8), FitzGerald (District 3), Flynn (District 2), Murphy (At large) and Santana (At large) voted to accept the report and allow BPD to continue to spy on the residents of Greater Boston.

We hope Bostonians consider how these councilors voted when they cast their ballot in the September 9th preliminary and November 4th general election. For the:

Polls are open 7 am – 8 pm on election days. Boston seeks poll workers. Volunteers must attend a two-hour paid training and earn stipends of $160 – $200. Bilingual speakers are strongly encouraged to apply. Sign up at their portal.


masspirates.org/blog/2025/09/0…

Gazzetta del Cadavere reshared this.





#Trump: #dazi e abusi


altrenotizie.org/primo-piano/1…


PRESENTAZIONE

Un saluto a tutti, io sono Marco Coloni e pubblico in Rete i comunicati dell'Unione dei Comitati contro l'inceneritore a Santa Palomba.

L’Unione dei Comitati contro l’inceneritore a Santa Palomba è composta da Comitati e Associazioni unite dal fine comune di impedire la costruzione dell’inceneritore a Santa Palomba e proteggere il territorio della periferia sud di Roma, dei Castelli Romani e del litorale sud e la salute dei cittadini che vi vivono in questi luoghi ed anche per proteggere la salubrità del territorio per far si che la nostra agricoltura bio venga tutelata e che l'illegalità sia lontana da una Terra già fortemente sfruttata.
Seguendo l'articolo 9 della costituzione italiana che promuove la tutela del paesaggio e del patrimonio storico-artistico, a seguito di una riforma nel 2022, anche l'ambiente, la biodiversità e gli ecosistemi, includendo la tutela degli animali.

Dove il Sindaco Gualtieri vorrebbe costruire l'inceneritore noi vogliamo realizzare il Parco Ettore Ronconi.

Grazie a tutti.



Ecco come Starlink aiuterà l’Ucraina con l’ok di Trump

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Gli Stati Uniti hanno approvato un pacchetto di vendite militari all'Ucraina dal valore di quasi 330 milioni di dollari, tra cui un'estensione dei servizi di comunicazione satellitare per i suoi terminali Starlink. Tutti i

in reply to Davide Tommasin ዳቪድ

@Davide Tommasin ዳቪድ il ruolo di starlink per le comunicazioni strategiche è una delle mattonelle di cui è lastricata la strada verso l'apocalisse... 🤣



Difesa aerea e produzione in massa, così la Turchia mette gli occhi sull’Europa

@Notizie dall'Italia e dal mondo

Durante una cerimonia pubblica ad Ankara, il presidente turco Recep Tayyip Erdogan ha presentato i primi sistemi operativi del programma nazionale di difesa aerea, il cosiddetto Steel Dome. Inoltre, ha anche annunciato l’inizio dei lavori per l’Ogulbey Technology



Perché il garante della privacy austriaco striglia YouTube di Google

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Con la pronuncia dell'autorità austriaca che ha condannato la piattaforma video di proprietà di Google per il modo arzigogolato attraverso il quale consentiva agli utenti di avere accesso ai

[AF]2050 reshared this.




I chatbot utilizzano già le conversazioni degli utenti per sviluppare i propri modelli

L'articolo proviene da #Euractiv Italia ed è stato ricondiviso sulla comunità Lemmy @Intelligenza Artificiale
Molti chatbot di intelligenza artificiale usano le conversazioni dei propri utenti come dati di addestramento per continuare a sviluppare i loro modelli di intelligenza artificiale