Kaspersky detects over 1 million daily tracking attempts

October 2024 News & Events, Information Security

Kaspersky's latest analysis of the 25 most prevalent web tracking services, including Google services, New Relic and Microsoft, has revealed over 38 billion instances of web trackers collecting user behaviour data in 2024, with an average of one million detections per day.

Web tracking involves collecting, storing, and analysing data on users' online behaviour. This data can include demographics, website visits, time spent on pages, and interactions such as clicks, scrolls, and mouse movements, which can be used for creating heatmaps and other insights. Businesses leverage this information to personalise experiences, boost user engagement, target ads more effectively, and measure the performance of their online services.

Kaspersky products feature a Do Not Track (DNT) component that blocks tracking elements designed to monitor user activity on websites. This feature enables Kaspersky to assess the current state of data harvesting by web trackers. To conduct this assessment, Kaspersky experts analysed the 25 most prevalent tracking services. These include four from Alphabet Inc. – Google Display & Video 360, Google Analytics, Google AdSense, and YouTube Analytics – as well as services from New Relic, and Microsoft, including Bing and other Microsoft tracking platforms. Their analysis revealed that 38 725 551 855 data collection incidents were detected in a year, from July 2023 to June 2024, with users sharing their data approximately 1 060 974 times per day.

The report provides a region-by-region analysis of the prevalence of various tracking services. Key findings include:

• Google Display & Video 360 holds the largest share among the top 25 tracking systems in Asia. In South Asia, it accounted for 25,47% of DNT component triggers, while in East Asia it was 24,45%, in the Middle East 22,92%, in Africa 19,03%, and in Europe 17,24%. The smallest share was in the Commonwealth of Independent States (CIS) at 8,38%, where local tracking systems are more prevalent.

• Google Analytics, which tracks user behaviour and keywords to optimise website traffic and performance, has its largest share in Latin America (14,89%), followed by the Middle East (14,12%). In Europe, it accounted for 11,93%, and in Africa 12,94%.

• Google AdSense trackers dominate in the Middle East (6,91%) and South Asia (6,85%), with the smallest shares in Oceania (3,76%) and the CIS (2,30%).

• The presence of these tracking systems has increased in almost all regions. While certain systems saw decreases in specific areas, others expanded, yet all belong to Google. This highlights Google's pervasive user tracking, far surpassing that of any other company.

• YouTube Analytics has the highest share in South Asia (12,1%) and the Middle East (12,30%), while in Africa it was 10,25%. The lowest share was shown in Europe (5,65%) and North America (4,56%).

• Microsoft trackers have their largest share in Latin America (3,38%) and the smallest in the CIS (0,68%). Africa accounted for 2,82%, while Europe measured 1,99%.

• Bing trackers show notable activity in Africa (8,46%) and Europe (5,33%), with their smallest presence in the Middle East (2,66%) and CIS (0,77%).

• South Korea, Japan, and Russia, where local Internet services are highly developed, regional tracking systems not only rank in the top 25, but can sometimes surpass global competitors.

“While the top 25 tracking services show that data collection is not confined to just a few companies, the more organisations storing and processing our information, the greater the risk of breaches. However, with most tracking handled by tech giants, there is strong motivation for them to protect user data and safeguard their reputations. Ultimately, though, users must take responsibility for their own data security, be mindful of the platforms they engage with, and take steps to protect their privacy," comments Anna Larkina, security and privacy expert at Kaspersky.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.