Category List

Tag Cloud

SC Magazinemobile phone analysis yorkshirePCI Forensic Investigationiphone forensicsLima Forensic Case ManagementApple MactrojansIntaForensicsISO 17025 accreditationNetwork forensicsHRCases Solvedcomputer forensics yorkshiredigital forensics londondata recoveryForensic AssuranceCyber SecurityComputer forensics leedsmalwareCase Management systemLima TrainingtrainingHackingSoftwarePFIContactJob VacanciesSMEsIoTLoss PreventionHacking InvestigationComputer Forensicsdigital forensics leedscomputer forensic analysisGraduate RecruitmentFinanceMobile Phone ForensicsLab Approveddisciplinary evidenceTraining eventCyber EssentialsUK case management softwarescientific case managementNew Featuresdigital forensics warringtonComputer forensics jobsEventcontinutiy managementmobile phone forensics jobsDefenceForensic Case ManagementQSAMarketingSecurityforensic scienceForensic careersCyber CrimePokemon GoCase Management softwareVersion 2.0Digital ForensicsPicture Imagescomputer investigationsLimaWarringtonmobile phone analysis leedsIT SecurityInvestigationHuman ResourcesMobile PhoneRemote ForensicsCase Managementexpert witness computersapple forensicscomputer forensics north englandISO 17025Cyber Essentials PlusDigital Evidencemobile phone forensics leedsTalentdigital forensic casecovert forensicsRecruitmentLima LiteiOS forensicsCyber-SecurityISO 9001Quality StandardsConference & ExhbitionsComputer EmergenciesData BreachCareers mobile phone forensics yorkshireData SecurityCyber AttackCloud ForensicsLaunch EventLima solutiondigital forensics north-westQualified Security AssessorForensics Europechain of custody managementpolice case managementISO 27001Mobile Phone ForenicsInformation SecurityHacking InvestigationsIncident ResponsedtSearchChip Off Forensicsdigital forensics yorkshireEmploymentDSSDigital Forensic Trainingdigital forensic case managementForensic jobsRansomwareUpdateLaw Enforcement Forensicscomputer expertforensic analysisPCICyber InvestigationGraduateInnovationUS case management softwareHelping Policeforensic securityCovert investigationsGraduate Training WeekISOsolicitorsITstafford jobsProfessionalsLegalData ProtectionCrime ReductionBlackbagInternet of ThingsStaffEmployee Disputechip-off forensicscomputer forensics laboratoryBreakfast EventWindowsComputer forensic case managementindecent imagesMalicious AttackreportingSpywareSoftware Demonstrationevidence managementForensic ReadinessJobsscientific support

Tag List

Hacking (2)
Malicious Attack (1)
Lima (20)
Graduate Recruitment (1)
Information Security (1)
Graduate (1)
Ransomware (1)
forensic science (1)
Update (1)
dtSearch (1)
Data Protection (1)
digital forensics warrington (1)
Cyber Essentials Plus (5)
Case Management (14)
computer expert (2)
Forensic Readiness (2)
ISO (1)
Software (3)
Incident Response (3)
Blackbag (1)
solicitors (1)
Cyber Attack (5)
Case Management system (6)
Software Demonstration (1)
HR (1)
Forensic careers (1)
Helping Police (1)
Breakfast Event (1)
Spyware (1)
Hacking Investigations (1)
Professionals (1)
Careers (1)
ISO 27001 (3)
Training event (1)
mobile phone forensics leeds (1)
Cyber Essentials (8)
Cyber Security (9)
Covert investigations (1)
evidence management (1)
Forensic Case Management (8)
Staff (1)
disciplinary evidence (1)
reporting (1)
IT (1)
Cases Solved (2)
IoT (1)
SMEs (1)
computer investigations (1)
Digital Forensic Training (2)
Mobile Phone Forensics (12)
Job Vacancies (2)
Employee Dispute (1)
Data Security (2)
data recovery (1)
mobile phone forensics jobs (1)
Recruitment (2)
expert witness computers (1)
Windows (2)
Investigation (1)
forensic analysis (4)
Remote Forensics (2)
QSA (2)
digital forensics london (1)
Lima Forensic Case Management (2)
chain of custody management (1)
Employment (1)
scientific case management (1)
Human Resources (1)
Cyber Investigation (1)
digital forensics leeds (2)
Pokemon Go (1)
digital forensic case management (3)
Finance (1)
computer forensics north england (2)
trojans (1)
ISO 9001 (2)
Conference & Exhbitions (3)
apple forensics (1)
digital forensic case (2)
police case management (1)
Quality Standards (1)
Hacking Investigation (1)
New Features (1)
US case management software (1)
Graduate Training Week (3)
Marketing (1)
iphone forensics (1)
Forensics Europe (1)
Lab Approved (1)
Defence (1)
Picture Images (2)
Cyber Crime (5)
Computer Forensics (20)
Internet of Things (1)
Contact (1)
Warrington (1)
indecent images (1)
ISO 17025 (3)
Launch Event (1)
Lima Lite (1)
Data Breach (2)
Security (1)
Cloud Forensics (1)
Lima solution (2)
Mobile Phone (2)
ISO 17025 accreditation (2)
Qualified Security Assessor (1)
computer forensic analysis (1)
continutiy management (1)
Loss Prevention (1)
computer forensics yorkshire (1)
PCI Forensic Investigation (3)
UK case management software (1)
Digital Forensics (22)
mobile phone analysis leeds (1)
Version 2.0 (2)
Computer forensics leeds (1)
iOS forensics (1)
IT Security (1)
Talent (1)
PCI (4)
Crime Reduction (1)
Digital Evidence (2)
Lima Training (4)
Mobile Phone Forenics (1)
Forensic jobs (1)
SC Magazine (3)
Network forensics (1)
Innovation (1)
IntaForensics (6)
Event (3)
Cyber-Security (5)
Computer Emergencies (2)
mobile phone forensics yorkshire (1)
Legal (1)
Computer forensic case management (1)
chip-off forensics (1)
digital forensics yorkshire (2)
DSS (1)
Apple Mac (1)
forensic security (1)
Jobs (1)
training (4)
computer forensics laboratory (1)
Case Management software (11)
Computer forensics jobs (1)
Chip Off Forensics (1)
Forensic Assurance (3)
digital forensics north-west (1)
PFI (1)
malware (2)
covert forensics (1)
stafford jobs (1)
scientific support (1)
mobile phone analysis yorkshire (1)
Law Enforcement Forensics (1)

How Private Is 'In Private' Browsing?

Sep 24, 2010

Whenever a computer user accesses the internet, records of their activity are automatically stored on their PC. This information might include the keywords they have searched for, pages they have visited and even the data they have entered into online forms. For users wishing to keep certain activities away from prying eyes, the most popular internet browsers have now introduced 'In Private' browsing which offers users a way to stop the most obvious traces of activity from being stored. 

Microsoft Internet Explorer 8 introduced this in the form of 'Inprivate' browsing, while Google Chrome offers an 'Incognito' mode and the soon to be released Mozilla Firefox 3.1 offers 'Private Browsing'. In Internet Explorer 8, the feature works by either preventing information from being created or by automatically deleting it once the user has finished browsing. For example, 'history' entries, which keep a record of the pages visited, are not created and form data and passwords are not stored. 

However, cookies, which provide websites with certain site-specific information about the user such as shopping cart contents, are stored as 'session cookies' meaning that they are cleared when the browser is closed. In Google Chrome, 'Incognito' mode offers similar features, as web pages visited and files downloaded are not recorded, and all cookies are deleted when the Incognito window is closed. 

While such features may afford a degree of privacy from other users, both Microsoft and Google have stressed that the modes are not designed to hide user activity from computer forensic experts or security specialists. In fact, after a round of testing, Dutch computer forensic expert Christian Prickaerts deemed the privacy afforded by Internet Explorer 8's 'Inprivate' browsing feature to be purely 'cosmetic', and warned that it should not be confused with anonymous web surfing.

In fact, the security offered by 'Inprivate' mode is mainly aimed at local level internet information, so that data regarding a user's internet activity may still be stored by the visited websites, the Internet Service Provider or the network administrator in the case of internet cafes or corporate workspaces. 

In addition, while entries are not made into the browser's 'History' file, details of web pages visited are still left intact in other areas of the computer's registry and 'cache data', which includes images and other information that IE stores to speed up browser times, is also left untouched. Such data is usually easily accessible with computer forensic software, even if it has been deleted manually. 

For home users then, the 'In Private' feature offers a useful way to keep information private from other users who are unlikely to deliberately pry, but for internet cafe users the feature should not be considered to offer significant additional security. As such, it should not be considered a replacement for other forms of internet security and the same level of caution should be exercised with regard to the type of data accessed from public locations. 

For businesses running corporate networks, it is important to ensure that systems administrators are aware of the feature, since 'In Private' browsing may remove the more obvious traces of wrongdoing. But for the time being at least, the feature offers no significant barrier to a successful investigation if computer misuse is suspected.