AT&T Wi-Fi hotspot reportedly stuffs extra ads into Web pages

Source: National Cyber Security – Produced By Gregory Evans

Stanford University computer scientist Jonathan Mayerwas recently Web browsing at a U.S. airport when he noticed there were too many online advertisements. A partnership between Apple and a credit card processing company could add local retailers — even food The website for Stanford, for example, displayed a pop-up ad for a 60 percent discount on jewelry. The Federal Communications Commission website appeared to be advertising ladies’ boots. An example of an ad said to be injected over the FCC’s website while on an AT&T free airport Wi-Fi hotspot. “The web had sprouted ads,” wrote Mayer on his blog. “Lots of them, in places they didn’t belong.” The Wi-Fi hotspot he was using at Dulles Airport near Washington, D.C., is run by AT&T, he said. Before boarding, Mayer wrote he analyzed the Web traffic to figure out what was happening. The hotspot was interfering with non-encrypted Web traffic and displaying on pages that were not affiliated with the website. It’s often referred to as “injecting” ads and is a somewhat controversial practice. The platform that was injecting the ads comes from a small company called RaGaPa, Mayer wrote. RaGaPa adds an advertising style sheet into HTTP traffic. If a Web browser […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post AT&T Wi-Fi hotspot reportedly stuffs extra ads into Web pages appeared first on National Cyber Security.

View full post on National Cyber Security