Web cookies (also called HTTP cookies, browser cookies, or simply cookies) are small pieces of data that websites store on your device (computer, phone, etc.) through your web browser. They are used to remember information about you and your interactions with the site.
Purpose of Cookies:
Session Management:
Keeping you logged in
Remembering items in a shopping cart
Saving language or theme preferences
Personalization:
Tailoring content or ads based on your previous activity
Tracking & Analytics:
Monitoring browsing behavior for analytics or marketing purposes
Types of Cookies:
Session Cookies:
Temporary; deleted when you close your browser
Used for things like keeping you logged in during a single session
Persistent Cookies:
Stored on your device until they expire or are manually deleted
Used for remembering login credentials, settings, etc.
First-Party Cookies:
Set by the website you're visiting directly
Third-Party Cookies:
Set by other domains (usually advertisers) embedded in the website
Commonly used for tracking across multiple sites
Authentication cookies are a special type of web cookie used to identify and verify a user after they log in to a website or web application.
What They Do:
Once you log in to a site, the server creates an authentication cookie and sends it to your browser. This cookie:
Proves to the website that you're logged in
Prevents you from having to log in again on every page you visit
Can persist across sessions if you select "Remember me"
What's Inside an Authentication Cookie?
Typically, it contains:
A unique session ID (not your actual password)
Optional metadata (e.g., expiration time, security flags)
Analytics cookies are cookies used to collect data about how visitors interact with a website. Their primary purpose is to help website owners understand and improve user experience by analyzing things like:
How users navigate the site
Which pages are most/least visited
How long users stay on each page
What device, browser, or location the user is from
What They Track:
Some examples of data analytics cookies may collect:
Page views and time spent on pages
Click paths (how users move from page to page)
Bounce rate (users who leave without interacting)
User demographics (location, language, device)
Referring websites (how users arrived at the site)
Here’s how you can disable cookies in common browsers:
1. Google Chrome
Open Chrome and click the three vertical dots in the top-right corner.
Go to Settings > Privacy and security > Cookies and other site data.
Choose your preferred option:
Block all cookies (not recommended, can break most websites).
Block third-party cookies (can block ads and tracking cookies).
2. Mozilla Firefox
Open Firefox and click the three horizontal lines in the top-right corner.
Go to Settings > Privacy & Security.
Under the Enhanced Tracking Protection section, choose Strict to block most cookies or Custom to manually choose which cookies to block.
3. Safari
Open Safari and click Safari in the top-left corner of the screen.
Go to Preferences > Privacy.
Check Block all cookies to stop all cookies, or select options to block third-party cookies.
4. Microsoft Edge
Open Edge and click the three horizontal dots in the top-right corner.
Go to Settings > Privacy, search, and services > Cookies and site permissions.
Select your cookie settings from there, including blocking all cookies or blocking third-party cookies.
5. On Mobile (iOS/Android)
For Safari on iOS: Go to Settings > Safari > Privacy & Security > Block All Cookies.
For Chrome on Android: Open the app, tap the three dots, go to Settings > Privacy and security > Cookies.
Be Aware:
Disabling cookies can make your online experience more difficult. Some websites may not load properly, or you may be logged out frequently. Also, certain features may not work as expected.
Kazem Kazerounian, dean of the UConn School of Engineering, discussed combating cyberattacks during a forum Monday with Gov. Ned Lamont.
HARTFORD — The age of increasing cyberattacks threatens businesses, state infrastructure, government and Connecticut's utilities.
But the current vulnerabilities have also created opportunities to share information and train people to fill an estimated 600,000 future cyber-security jobs across the country, state experts said Monday during a forum at the University of Connecticut School of Business.
"If I was a bad actor, I would think I'd go after the low-hanging fruit" presented by smaller towns in the state, said Gov. Ned Lamont. "I would assume that they would be a little less sophisticated when it comes to cyber protections. I would worry that that's a back door into the Department of Revenue Services or your financial entity, or your utility. I assume this is a really good way to check on those doors that are left ajar and to make sure they're locked. That makes an awful lot of sense to me. Get on-board with these skills. You're going to have to learn these skills. It's an incredibly important skill set to have. There's a guaranteed job."
STORRS, CT – During National Cybersecurity Awareness Month, Synchrony, a premier consumer financial services company, and The University of Connecticut School of Engineering are joining forces to sponsor CyberSEED 2019, a cyber wargame competition, on Saturday, October 19th from 9am to 5:30pm.
More than forty-two teams from 30 colleges and universities across the country will face off in a variety of challenges that test students’ skills, including: reverse engineering, web application security, network traffic analysis, and cryptography. The grand prize winner will take home $15,000; there will also be two smaller prizes of $2,000 and $500.
Registration for the competition is closed, but registration for a concurrent workshop will remain open through 17 October.
WHAT: CyberSEED – a cyber Capture the Flag competition and Workshop
WHEN: Saturday, October 19th
9:00am – opening remarks
9:30am – competition commences
5:00pm – competition ends
5:30pm – awards and closing
The workshop runs concurrently with the Capture the Flag competition.
First CyberSEED Event Combines Cybersecurity Competition and Discussion
More than 350 people attended the first-ever CyberSEED Cybersecurity, Education & Diversity Challenge, an event that combined expert speakers and three cybersecurity competitions.
The two-day conference took place Oct. 20 and 21 and was organized by the Center of Excellence for Security Innovation (CSI), a partnership between Comcast and the UConn School of Engineering’s Center for Hardware Assurance, Security, and Engineering (CHASE).
“I think we exceeded the expectations in many ways,” said Mark Tehranipoor, Director, Comcast Center of Excellence (CSI). “Because this was the first CyberSEED event for us, we thought ‘Well, we’ll use it as an experience and learn from this.’ But within a couple months, it became clear that we didn’t have time for ‘learning from this.’ We just have to take it to the next level right away.”
The ambitious event brought more than 40 teams from universities across the U.S. to the UConn campus to compete in three unique cybersecurity challenges for more than $100,000 in prizes. The competition played out over the two days in the same venue – the Lewis B. Rome Commons – that hosted some of most respected experts in the field of cybersecurity.
The conference featured more than 20 speakers, including keynote addresses from Rear Admiral David Simpson (ret.), Chief of the Federal Communications Commission’s Public Safety and Homeland Security Bureau; Cheri Caddy, Director for Cybersecurity Policy Integration and Outreach, National Security Staff, The White House; and Donna Dodson, Chief Cyber Security Advisor, NIST.
Speakers and panel discussions addressed a wide range of topics related to cybersecurity – from protecting against international-level cyberattacks, to how businesses can protect their customers. Tehranipoor said he was particularly impressed with the panel discussions that featured all three of the major players in cybersecurity.
“When you bring academia, government and industry into one room and let them talk, I think it’s extremely beneficial,” he said. “The three sides have to hear each other.”
Each is coming at the issue with a slightly different approach, he said, especially in regard to confidentiality. Talking with each other helps resolve those differences.
“At events likes these, they come together and talk about what they want, and I think there’s always ways to come up with common ground,” he said. “I think meeetings like this could have a major impact in the way we address cybersecurity issues.”
The conference also featured a VIP tour of the CSI lab, which opened earlier this year. Tehranipoor and John Chandy, Associate Head of Electrical and Computer Engineering, led guests through the lab and showcased the technology that’s coming out of it.
Sponsors for CyberSEED included Microsoft, Dell, HP, Symantec, CA Technologies, Juniper Networks, Accenture, Veracode, Wipro, PWC and Cyveillance.
University of New Haven team members discuss strategy in the Capture the Flag competition, during a two-day cybersecurity conference organized by the Center of Excellence for Security Innovation, a partnership between Comcast and the UConn School of Engineering's Center for Hardware Assurance, Security, and Engineering. Their coach, Frank Breitinger, will teach a course next semester called “Hacking.” (Christopher LaRosa/UConn Photo)
Computer hackers descended upon UConn this past week, and for their efforts, came away with more than $100,000 in prize money.
Teams from 43 colleges including UConn gathered at the Lewis B. Rome Commons Ballroom to take part in various challenges at CyberSEED, a two-day cybersecurity conference that also featured speakers and panel discussions. Rear Adm. David Simpson, chief of the Federal Communications Commission’s Public Safety and Homeland Security Bureau, gave a talk about the state of national and international cybersecurity.
The conference, which took place Oct. 21-22, was organized by the Center of Excellence for Security Innovation (CSI), a partnership between Comcast and UConn School of Engineering’s Center for Hardware Assurance, Security, and Engineering (CHASE). It was the first of what is planned to be an annual event.
University of New Haven team members discuss strategy in the Capture the Flag competition, during a two-day cybersecurity conference organized by the Center of Excellence for Security Innovation, a partnership between Comcast and the UConn School of Engineering’s Center for Hardware Assurance, Security, and Engineering. (Christopher LaRosa/UConn Photo)
The competitions featured both software and hardware challenges, but the most popular was Capture the Flag. Here, teams hacked away at classified files of the fictitious country Cyberia, acting on behalf of the small neighboring nation Sanctus Pirata. The files provided details of the country’s oil rigs, allowing the smaller nation to tap into them if successful.
Teams came from as far as Washington State and New Mexico. Some were veterans of hacking competitions, others complete novices. Coming to UConn for their first hacking competition, East Tennessee State University flew into Connecticut at 2 a.m. Energy drinks and coffee figured heavily in their strategy. Their coach, computer science professor Mike Lehrfeld, said the team members had spent much of the past few weeks discussing strategies and different scenarios they might encounter.
“The competition allows them to showcase what they’ve worked on all year long,” he said.
The team from Syracuse University hacks away for classified files in the Capture the Flag competition. (Christopher LaRosa/UConn Photo)
In the end, it was Brown University who took top honors based on speed and the number of documents uncovered. They won $15,000 for first place. Overall, more than $100,000 was awarded to winning teams. No one went away empty-handed: every participant received a Samsung tablet.
So how do you prepare for a hacking competition?
“Lots of YouTube video, lots of Googling,” said Andrew Rector, a senior with the team from Bloomsburg University in central Pennsylvania. Even though they were taking on the role of the bad guys, he said, “these kinds of efforts will pay off for the good guys. You need to know how a system is vulnerable before you can protect it.”
Indeed, conference speaker Cheri Caddy, director of cybersecurity policy integration and outreach at the White House, told the audience that security efforts have lagged because of a lack of training in the field.
Michael Garvin, senior manager of product management for Symantec, was one of the architects of the Capture the Flag competition. They devise their games partly by current events – who’s committing cyberattacks and why – and from feedback from companies who want to protect their security.
These competitions, he said, are a way of identifying vulnerabilities in a company’s computer system.
“We’ll ask companies ‘What is it that you’re worried about?’ Then we can prevent those things from happening, or lessen the amount of damage,” he said. “We’ve seen some interesting and novel methods in these competitions – all the better to help us prepare.”