{"id":55414,"date":"2024-02-24T00:25:19","date_gmt":"2024-02-24T00:25:19","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35575\/Avast-Ordered-To-Stop-Selling-Browsing-Data-From-Its-Browsing-Privacy-Apps.html"},"modified":"2024-02-24T00:25:19","modified_gmt":"2024-02-24T00:25:19","slug":"avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/","title":{"rendered":"Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/02\/GettyImages-1232937090-800x539.jpg\" alt=\"Avast logo on a phone in front of the words \" cancelled on a screen><figcaption class=\"caption\">\n<div class=\"caption-credit\">Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2024\/02\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">57<\/span> <\/a> <\/aside>\n<p> <!-- cache hit 285:single\/related:3bde780bc7db523f099fecb6b95bd336 --><!-- empty --><\/p>\n<p>Avast, a name known for its <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/02\/game-mode-exploits-high-severity-flaw-that-went-unpatched-in-dota-2-for-months\/\">security research<\/a> and antivirus apps, has long offered Chrome extensions, mobile apps, and other tools aimed at increasing privacy.<\/p>\n<p>Avast&#8217;s apps would &#8220;block annoying tracking cookies that collect data on your browsing activities,&#8221; and prevent web services from &#8220;tracking your online activity.&#8221; Deep in its privacy policy, Avast said information that it collected would be &#8220;anonymous and aggregate.&#8221; In its fiercest rhetoric, Avast&#8217;s desktop software claimed it would stop &#8220;hackers making money off your searches.&#8221;<\/p>\n<p>All of that language was offered up while Avast was collecting users&#8217; browser information from 2014 to 2020, then selling it to more than 100 other companies through <a href=\"https:\/\/arstechnica.com\/tech-policy\/2020\/01\/avast-kills-off-jumpshot-the-subsidiary-that-sold-all-your-web-data\/\">a since-shuttered entity known as Jumpshot<\/a>, according to the Federal Trade Commission. Under <a href=\"https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/D%26O-Avast.pdf\">a proposed recent FTC order<\/a> (PDF), Avast must pay $16.5 million, which is &#8220;expected to be used to provide redress to consumers,&#8221; <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2024\/02\/ftc-order-will-ban-avast-selling-browsing-data-advertising-purposes-require-it-pay-165-million-over\">according to the FTC<\/a>. Avast will also be prohibited from selling future browsing data, must obtain express consent on future data gathering, notify customers about prior data sales, and implement a &#8220;comprehensive privacy program&#8221; to address prior conduct.<\/p>\n<p>Reached for comment, Avast provided a statement that noted the company&#8217;s closure of Jumpshot in early 2020. &#8220;We are committed to our mission of protecting and empowering people\u2019s digital lives. While we disagree with the FTC\u2019s allegations and characterization of the facts, we are pleased to resolve this matter and look forward to continuing to serve our millions of customers around the world,&#8221; the statement reads.<\/p>\n<h2>Data was far from anonymous<\/h2>\n<p>The <a href=\"https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/Complaint-Avast.pdf\">FTC&#8217;s complaint<\/a> (PDF) notes that after Avast acquired then-antivirus competitor Jumpshot in early 2014, it rebranded the company as an analytics seller. Jumpshot advertised that it offered &#8220;unique insights&#8221; into the habits of &#8220;[m]ore than 100 million online consumers worldwide.&#8221; That included the ability to &#8220;[s]ee where your audience is going before and after they visit your site or your competitors&#8217; sites, and even track those who visit a specific URL.&#8221;<\/p>\n<p>While Avast and Jumpshot claimed that the data had identifying information removed, the FTC argues this was &#8220;not sufficient.&#8221; Jumpshot offerings included a unique device identifier for each browser, included in data like an &#8220;All Clicks Feed,&#8221; &#8220;Search Plus Click Feed,&#8221; &#8220;Transaction Feed,&#8221; and more. The FTC&#8217;s complaint detailed how various companies would purchase these feeds, often with the express purpose of pairing them with a company&#8217;s own data, down to an individual user basis. Some Jumpshot contracts attempted to prohibit re-identifying Avast users, but &#8220;those prohibitions were limited,&#8221; the complaint notes.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>The connection between Avast and Jumpshot became broadly known in January 2020, after reporting by Vice and PC Magazine revealed that clients, including Home Depot, Google, Microsoft, Pepsi, and McKinsey, were buying data from Jumpshot, as seen in confidential contracts. Data obtained by the publications showed that buyers could purchase data including Google Maps look-ups, individual LinkedIn and YouTube pages, porn sites, and more. &#8220;It&#8217;s very granular, and it&#8217;s great data for these companies, because it&#8217;s down to the device level with a timestamp,&#8221; one source told Vice.<\/p>\n<p>The FTC&#8217;s complaint provides more detail on how Avast, on its own web forums, sought to downplay its Jumpshot presence. Avast suggested both that only non-aggregated data was provided to Jumpshot&nbsp;and that users were informed during product installation about collecting data to &#8220;better understand new and interesting trends.&#8221; Neither of these claims proved true, the FTC suggests. And the data collected was far from harmless, given its re-identifiable nature:<\/p>\n<blockquote>\n<p>For example, a sample of just 100 entries out of trillions retained by Respondents<br \/>showed visits by consumers to the following pages: an academic paper on a study of symptoms<br \/>of breast cancer; Sen. Elizabeth Warren\u2019s presidential candidacy announcement; a CLE course<br \/>on tax exemptions; government jobs in Fort Meade, Maryland with a salary greater than<br \/>$100,000; a link (then broken) to the mid-point of a FAFSA (financial aid) application;<br \/>directions on Google Maps from one location to another; a Spanish-language children\u2019s<br \/>YouTube video; a link to a French dating website, including a unique member ID; and cosplay<br \/>erotica.<\/p>\n<\/blockquote>\n<p>In <a href=\"https:\/\/www.ftc.gov\/business-guidance\/blog\/2024\/02\/ftc-says-avast-promised-privacy-pirated-consumers-data-treasure\">a blog post accompanying its announcement<\/a>, FTC Senior Attorney Lesley Fair writes that, in addition to the dual nature of Avast&#8217;s privacy products and Jumpshot&#8217;s extensive tracking, the FTC is increasingly viewing browsing data as &#8220;highly sensitive information that demands the utmost care.&#8221; &#8220;Data about the websites a person visits isn\u2019t just another corporate asset open to unfettered commercial exploitation,&#8221; Fair writes.<\/p>\n<p>FTC commissioners voted 3-0 to issue the complaint and accept the proposed consent agreement. Chair Lina Khan, along with commissioners Rebecca Slaughter and Alvaro Bedoya, <a href=\"https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/2024.02.21StatementofChairKhanRegardingAvast.pdf\">issued a statement on their vote.<\/a><\/p>\n<p>Since the time of the FTC&#8217;s complaint and its Jumpshot business, Avast has been acquired by <a href=\"https:\/\/www.gendigital.com\/\">Gen Digital<\/a>, a firm that contains Norton, Avast, LifeLock, Avira, AVG, CCLeaner, and ReputationDefender, among other security businesses.<\/p>\n<p><em>Disclosure: Cond\u00e9 Nast, Ars Technica&#8217;s parent company, received data from Jumpshot before its closure.<br \/><\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35575\/Avast-Ordered-To-Stop-Selling-Browsing-Data-From-Its-Browsing-Privacy-Apps.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55415,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9945],"class_list":["post-55414","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacydata-lossfraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-24T00:25:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/02\/GettyImages-1232937090-800x539.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps\",\"datePublished\":\"2024-02-24T00:25:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/\"},\"wordCount\":843,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps.jpg\",\"keywords\":[\"headline,privacy,data loss,fraud\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/\",\"name\":\"Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps.jpg\",\"datePublished\":\"2024-02-24T00:25:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps.jpg\",\"width\":800,\"height\":539},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,data loss,fraud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacydata-lossfraud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/","og_locale":"en_US","og_type":"article","og_title":"Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-02-24T00:25:19+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/02\/GettyImages-1232937090-800x539.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps","datePublished":"2024-02-24T00:25:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/"},"wordCount":843,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/02\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps.jpg","keywords":["headline,privacy,data loss,fraud"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/","url":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/","name":"Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/02\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps.jpg","datePublished":"2024-02-24T00:25:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/02\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/02\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps.jpg","width":800,"height":539},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/avast-ordered-to-stop-selling-browsing-data-from-its-browsing-privacy-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,data loss,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacydata-lossfraud\/"},{"@type":"ListItem","position":3,"name":"Avast Ordered To Stop Selling Browsing Data From Its Browsing Privacy Apps"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55414"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55414\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55415"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}