Browse Definitions :
Definition

Web bug (Web beacon)

Contributor(s): Tim Joyce

A Web bug, also known as a Web beacon, is a file object that is placed on a Web page or in an e-mail message to monitor user behavior.

Unlike a cookie, which can be accepted or declined by a browser user, a Web bug arrives as just another GIF or other file object. It can usually only be detected if the user looks at the source version of the page to find a tag that loads from a different Web server than the rest of the page.

Although proponents of Internet privacy object to the use of Web bugs in general, most concede that Web bugs can be put to positive use, for example to track copyright violations on the Web.

According to Richard M. Smith, a Web bug can gather the following statistics:

  • The IP address of the computer that fetched the Web bug.
  • The URL of the page that the Web bug is located on.
  • The URL of the Web bug.
  • The time the Web bug was viewed.
  • The type of browser that fetched the Web bug.
  • A previously set cookie value.

Web bugs are often used by spammers to validate e-mail addresses. When a recipient opens an email message that includes a Web bug, information returned to the sender indicates that the message has been opened, which confirms that the email address is valid.

This was last updated in July 2009

Continue Reading About Web bug (Web beacon)

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close