To share or not to share? Secrets behind the popular "share" button
The share button is not as innocent as it seems. You might be animated by the best intentions when you click it and we don”t want to ruin it for you. On the contrary, we want to add one more: sharing is caring for your data, too.
Fact: A data haul of more than 40 million records belonging to ShareThis users was put up for sale on a dark web marketplace in February 2019.
The 2.7 GB of leaked data included unique email addresses, names, usernames, hashed passwords, and additional profile information such as gender, birth date and addresses. Although there were no signs of financial compromise of users, ShareThis did deactivate accounts and prompt customers to change associated passwords so that malicious actors couldn”t access user accounts.
Was your data exposed in the ShareThis breach? Find out now.
Behind the scenes of the “share” industry
Behind every “share” button there is a company (Share This is one of them) that offers this easy-to-use website-integrated tool to publishers so that they can promote content across channels.
When you share a post or an article, the tracking technologies (including cookies) they use help them create a comprehensive view of your interests, likes and dislikes. These companies enrich the ads and tracking ecosystem by creating user profiles to increase customer engagement and target personalized advertisements.
On top of the customizable social sharing tools, ShareThis collects data about how internet users interact with websites, ads and various content â€“ this happens without the user ever creating an account on their platform. Web pages viewed, country of residence, IP addresses, device IDs, time spent on a webpage and information about the user”s browser are just some of the data points collected and analyzed.
However, like any online service providers, once you subscribe or create an account, you willing to provide particular data that make up your profile. Any content publisher or blogger, who creates an account on the website, will need to provide a valid email address and password or choose an alternative login method, which may create additional ripples in the data-gathering process.
The value of user information in data marketplaces is invaluable. As you may know, particular datasets can be easily linked to individuals in real life. While this data may simply enable better ad targeting, you can never know where or how your information is used.
Becoming a privacy-conscious internet user takes time and commitment. As a first step, you can check if and what personally identifiable information has been compromised in a data breach with Bitdefender”s Digital Identity Protection tool.
Enhance your cyber resilience and privacy on Computer Security Day in four easy steps
November 29, 2022
How to monitor your online privacy during your Thanksgiving trip
November 22, 2022
Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info
November 16, 2022
Bitdefender VPN in 2022: the new, the improved, and the soon-to-be
November 14, 2022
Cyber Tips for a Spook-Free Halloween
October 26, 2022
August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War
August 31, 2022