Archives - Browser Extensions

Watch out for Google Chrome extension malware

Extensions can augment web browsers but they can also create security risks. For instance, Google Chrome is probably just another trusted application to your operating system and antivirus software, meaning it – and its extensions – can run code without a problem. Some extensions are malicious, though. Keep your eye out for unusual names, odd […]

Use the HTTPS Everywhere plugin on Google Chrome

The “S” in HTTPS in a URL is an indication that you can trust that website with your personal information. To avoid using sites without the “S,” you can install a plugin on Google Chrome, which automatically switches sites from HTTP to HTTPS. To add the plugin: Go to Home in the Chrome web store. […]

Browse securely with the HTTPS Everywhere plug-in

The HTTPS Everywhere plug-in claims to enhance security by encrypting user communications with a wide variety of websites. It’s available for most major online and mobile browsers, like Chrome, Firefox, Edge and Opera.

New computer — secure your web browser

When you first install a web browser on a new computer, it will not usually have secure settings by default, you will need to adjust your browser’s security settings manually. Securing your browser is another critical step in improving your computer’s security by reducing attacks that take advantage of unsecured web browsers.

Weed out old Chrome Extensions

Outdated Chrome Extensions can be exploited by malicious actors. Periodically review your Extensions to make sure they appear in good working order and that they’re properly updated. If you’re no longer using an Extension, delete it, particularly if it appears to no longer be supported by the developer.

Set up a VPN for remote access to workplace applications

Some companies require employees to use virtual private networks (VPNs) to access applications while out of the office. Even if not a technical requirement, though, it’s a good idea to use a VPN so that you avoid risks such as data interception from man-in-the-middle attacks, as well as ISP surveillance. VPNs are available as both […]