The Preference Data that we collect from users includes, for example, a user's browser type and version (e.g., Internet Explorer 7.0, Firefox 3.0, or Safari 3.1.1), and operating system (e.g., Windows Vista, Macintosh OS X, or Android 4.1 for certain mobile users). We also may collect demographic information such as a user’s gender, age, and income range. In addition, we may collect information about a user's browsing behavior, such as the date and time they visit the Web pages on which we are collecting Preference Data, the content areas or pages of the Web sites that a user visits (e.g., "sports section" or "technology section"), and other click-stream data, none of which includes personal information about the user.
That's why we don't recommend visiting this site very often and ignoring redirections to it.
All this activity begins when computer gets infected with the browser hijacker. This virus can easily affect all Internet browsers and then initiate its redirections to unwanted sites or simply a blank page, which has an url: tags.bluekai.com. If you re redirected to this or similar website without any intension to do that, check your computer with anti-spyware and see what it finds there..
Browsers hijackers, that additionally redirect people to similar sites, attack computers out of nowhere. For that, they use typical ways of distribution, such as spam emails, malicious links, infected downloads and similar. Once it manages to get inside, this infection alters browser's settings so that it could hijack it and make it follow its rules. As a result, victim is redirected to certain pages and may even find another site instead of his/hers default homepage or search engine. You should never ignore the signs that clearly show that browser virus is on your computer. You must remove this threat upon detection.
Undoubtedly, you must remove browser hijacker virus from your computer as soon as you notice its redirections. While it's really hard to find applications that are related to this browser hijacker manually, you should use automated security applications. Try using STOPzilla or SpyHunter that should help you with its removal.
Information added: 02/05/13 06:15;
information updated: 02/05/13 06:15