Feeds

ISPs scramble to explain mouse-sniffing tool

Would you trust faceless corporations with your, er, mouse movements?

Internet Security Threat Report 2014

Sky Broadband has been caught using JavaScript to track every click and shuffle on its support pages, but it's not alone: other ISPs have also admitted recording every frustrated wobble of the mouse on their support pages.

Readers at ISP Review spotted Sky using a JavaScript tool called SessionCam to record rodent tracks on its support pages, but the Murdoch-owned telly company said it doesn't think it's doing anything wrong, while BT also happily told ISP Review that it does the same thing with a similar product called ClickTale.

Sky told the website that data stored by SessionCam is "transferred to a secure environment using SSL encryption and secured using numerous levels of control at an application, data and infrastructure level".

ISP Review is, of course, only concerned with ISPs, but the practice of logging one's activity within a website is far from limited to that industry. For example, Crazy Egg – an outfit which promises "The Astonishing Power of Eye Tracking Technology... Without the High Costs" – counts eBay, Amazon and Dell, among others, in its customer list.

Crazy Egg produces heat maps showing where mice hang out, how far down the page visitors scroll and which bits they spend longest reading. It's not perfect – it can't tell if you've paused to read some text or were interrupted by a human visitor – but it can give a general impression to aid page design.

This is nothing new. Some shopping centres track visitors (as groups) to establish their browsing habits. Companies such as Path Intelligence track every mobile phone in a shopping centre (anonymously, as they have no access to, or – so they say – interest in customers' details) to see how long a window display grabs one's attention or the order in which shops are visited.

Websites have always taken a huge interest in users' behaviour, and gained from the ability to record every click, but is recording every mouse-shuffle a step too far?

Those using the technology don't think so, and while the dancing of a mouse pointer might not seem important, the ability to track one's eyes (to see which advert is being viewed) is already available and slipping into mainstream products. Perhaps we should be working out how much we're prepared to share before we start sharing it. ®

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.