SecurityWeek – (International) Criminals bypass sophisticated device fingerprinting with basic tools. Research from Trusteer shows that device fingerprinting, which is used in fraud detection systems, could be useless after they discovered a manual for bypassing such features circulated among online criminals. In it, the author explains how to bypass the layered protection found in several fingerprinting systems. The tutorial explains that the use of commercial VPNs and proxy services will help defeat the IP protections within the fingerprinting systems, and adds information on how to make sessions from a single system appear as if they originate from different computers, operating systems, and browsers by altering the user agent headers.
Source: http://www.securityweek.com/criminals-bypassing-sophisticated-device-fingerprinting-basic-tools
Ali Loney is a Senior UX Designer at Walmart Labs. She is based in Canada and was the former Graphic Designer at Sonatype.
Explore All Posts by Ali LoneyTags
Discover a Better Way to SCA
Forrester evaluated 10 SCA providers and recognized Sonatype with the highest possible scores. Learn why Sonatype was named a leader in Forrester Wave™ for SCA.