Tracking Cookie

Tracking Cookie

Updated:
22 July 2014
Risk Impact:
Low
Systems Affected:
Linux, Mac, Symbian OS, UNIX, Windows

Behavior

Tracking Cookies are a specific type of cookie that is distributed, shared, and read across two or more unrelated Web sites for the purpose of gathering information or potentially to present customized data to you. Not all cookies are tracking cookies.

Tracking cookies are not harmful like malware, worms, or viruses, but they can be a privacy concern. As an example, if you go to a Web site that hosts online advertising from a third-party vendor, the third-party vendor can place a cookie on your computer. If another Web site also has advertisements from the third-party vendor, then that vendor knows you have visited both Web sites. Nothing malicious has occurred, but the advertising company can determine indirectly all the sites you have been to if they have cookies present on those sites.

Further resources:
Tracking Cookie blog entry

Antivirus Protection Dates

  • Initial Rapid Release version 02 October 2014 revision 022
  • Latest Rapid Release version 02 October 2014 revision 022
  • Initial Daily Certified version 16 August 2006
  • Latest Daily Certified version 10 May 2010 revision 025
  • Initial Weekly Certified release date 15 August 2006
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Tracking Cookie is a detection for pieces of information stored on computers after visiting certain Web sites. Tracking cookies are distributed and retrieved across multiple Web site domains allowing Web sites to monitor visitors' surfing habits. Some cookies can contain personal information or are bound to user profiles.

A Little About Cookies
A cookie is a text file that a Web site can install on your computer. Cookies enable a Web site to tailor pages presented to you by storing information about you in the cookie text file. The Web site can remember you for easy navigation and access during your return visits for products, services, and content. Advertisers may use this information to understand your Web surfing habits. Cookies are only text files and are NOT worms, viruses, or directly malicious, but they may have privacy implications.

Tracking Cookies are a specific type of cookie that is distributed, shared, and read across two or more unrelated Web sites for the purpose of gathering information or potentially to present customized data to you. Not all cookies are tracking cookies. Tracking cookies are not harmful like malware, worms or viruses, but they can be a privacy concern. As an example, if you go to a Web site that hosts online advertising from a third-party vendor, the third-party vendor can place a cookie on your computer. If another Web site also has advertisements from the third-party vendor, then that vendor knows you have visited both Web sites. Are these advertisers directly interested in your specific browsing habits? Most likely not as this information is collected over thousands or millions of users to determine overall trends in Web surfing.

Orphan Cookies
Orphan cookies are cookie files in your Temporary Internet Files folder that do not belong to anything specifically in your browser index file, as well as listings in your browser index file that don’t have an associated cookie. There is nothing to worry about - these cookies are not seen by your browser, they are merely taking up hard drive space. Symantec Norton products use an "Orphan Cleanup" feature to remove these extra cookies.

Are Cookies Dangerous?
Contrary to what some users may think, cookies are NOT inherently malicious or dangerous. If you run a scan and you find a tracking cookie, the tracking cookie does not represent a malware infection. These are low to minimal security issues. We have seen many security companies and free "Spyware Removal Tools" emphasize detection of cookies, calling them Spyware and Trackware and stating that you are "infected", which is most unlikely to be the case. Cookies and the information they store are more related to privacy concerns.

To determine if the privacy concern is an issue for you, you need to decide if the benefits of today’s enhanced Web site customizations outweigh the sensitivity of the information being collected. This is very similar to the power and flexibility of using major search engine technology and giving your frequent shopper card at your local grocery store – each has potential benefits and downsides. A search engine is helpful for quickly and easily finding information, but the search engine companies could potentially know about the types of things you search for and which links you decide to go to.
We have grown accustomed to targeted information being presented to us, but our privacy is what may suffer as advertisers and corporations learn more about our Web surfing habits.

How Do I Avoid Tracking Cookies?
If you are still concerned about cookies, there are a few steps you can take. Certain Web sites may NOT function properly if cookies are removed or deleted.
  • Be selective about which Web sites you visit.
  • Check your browser’s privacy settings. Most browsers have settings to either delete or block cookies from your computer automatically.
You may have arrived at this page either because you have been alerted by your Symantec product about this risk, or you are concerned that your computer has been affected by this risk.

Before proceeding further we recommend that you run a full system scan . If that does not resolve the problem you can try one of the options available below.



FOR NORTON USERS
If you are a Norton product user, we recommend you try the following resources to remove this risk.

Removal Tool

If you have an infected Windows system file, you may need to replace them using from the Windows installation CD .


How to reduce the risk of infection
The following resources provide further information and best practices to help reduce the risk of infection.


FOR BUSINESS USERS
If you are a Symantec business product user, we recommend you try the following resources to remove this risk.

Identifying and submitting suspect files
Submitting suspicious files to Symantec allows us to ensure that our protection capabilities keep up with the ever-changing threat landscape. Submitted files are analyzed by Symantec Security Response and, where necessary, updated definitions are immediately distributed through LiveUpdate™ to all Symantec end points. This ensures that other computers nearby are protected from attack. The following resources may help in identifying suspicious files for submission to Symantec.


Removal Tool

If you have an infected Windows system file, you may need to replace them using from the Windows installation CD .


How to reduce the risk of infection
The following resource provides further information and best practices to help reduce the risk of infection.
Protecting your business network



MANUAL REMOVAL
The following instructions pertain to all current Symantec antivirus products.

1. Performing a full system scan
How to run a full system scan using your Symantec product


2. Restoring settings in the registry
Many risks make modifications to the registry, which could impact the functionality or performance of the compromised computer. While many of these modifications can be restored through various Windows components, it may be necessary to edit the registry. See in the Technical Details of this writeup for information about which registry keys were created or modified. Delete registry subkeys and entries created by the risk and return all modified registry entries to their previous values.