News and Notes from the Makers of Nexus | Sonatype Blog

Criminals Bypassing Sophisticated Device Fingerprinting with Basic Tools

Written by Ali Loney | June 07, 2012

SecurityWeek – (International) Criminals bypass sophisticated device fingerprinting with basic tools. Research from Trusteer shows that device fingerprinting, which is used in fraud detection systems, could be useless after they discovered a manual for bypassing such features circulated among online criminals. In it, the author explains how to bypass the layered protection found in several fingerprinting systems. The tutorial explains that the use of commercial VPNs and proxy services will help defeat the IP protections within the fingerprinting systems, and adds information on how to make sessions from a single system appear as if they originate from different computers, operating systems, and browsers by altering the user agent headers.

Source: http://www.securityweek.com/criminals-bypassing-sophisticated-device-fingerprinting-basic-tools