BNMC Blog

Do Browser Apps Put You at Risk?

Do Browser Apps Put You at Risk?

For the average PC user, the Internet browser is probably the most utilized piece of software other than your OS. Depending on which browser you use, you may decide to download additional software to give you features that you typically don’t have or give you functionality that is all new. Before you use these software add-ons, you should know that there have been several examples of this software working against users. Let’s take a look at how browser extensions work and how you can get better functionality without putting your data at risk. 

What Are Browser Extensions?

Essentially, browser extensions are pieces of software that bring external integrations to the functionality of the browser itself. In Chrome and Microsoft Edge, they are called extensions, while in Firefox they are called add-ons. There are all types of options to choose from. There are apps to help with browser security, productivity, communications, and much more. 

A problem that many users--business and otherwise--have with these browser extensions is that sometimes they can be vulnerable to infiltration (or they just flat-out spy on you). This presents a situation where, sure you are getting some enhanced productivity, but if the price is that you need to put your data at risk, that boost in productivity won’t help. 

Obviously, some browser extensions/add-ons are secure and have major utility for end-users. Ad blockers, screenshot tools, password managers, and instant messaging tools are often deployed through extensions by users to improve the functionality and security of their browsing experience. 

Examples of Risks

People have been using these browser extensions for some time. Just this last year, millions of users of Google Chrome, Mozilla Firefox, and Chromium-based browsers such as Opera were victims of rogue extensions/add-ons. These extensions collected people’s data through capturing titles and URLs of the websites they clicked on. This unauthorized data collection included sensitive data such as medical records and credit card information. Then, if that wasn’t bad enough, the collected web histories of these users were published by a paid service called Nacho Analytics. 

Google Is Stepping Up

Soon after the news broke, Google went ahead and set a policy that is aimed at improving the security of the extensions available on the Chrome Web Store. They launched a full-scale audit of the system, which they called Project Strobe. The findings of this audit led them to change the policy of third-party extensions. Now extensions will only be able to request access to the minimum amount of user data necessary to function.

The company also announced they will extend the requirements around its privacy policies. The new changes will be implemented throughout the end of 2019 and into 2020. There are currently 180,000 extensions available on the Chrome Web Store. Essentially, the shift is going to make it more difficult for these third-party extensions to grab user information. 

Data security has to be a major point of emphasis for any business or organization that relies on information systems to function effectively. Call the IT experts at BNMC today at 978-482-2020 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 31 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Productivity Privacy Cloud User Tips Microsoft Email Network Security Software Computer Hackers Malware Hosted Solutions Data Google Business Communication Mobile Devices Small Business Workplace Tips IT Services Efficiency Hardware IT Support Tech Term Data Recovery Internet Managed IT Services Innovation Cloud Computing Backup Ransomware Smartphone Windows Smartphones Outsourced IT Android Upgrade Data Backup Users Miscellaneous Saving Money Mobile Device Business Continuity Windows 10 Facebook Information Phishing Office 365 Managed IT Services Network Microsoft Office Business Management Browser Server Cybersecurity Social Media communications Disaster Recovery Windows 10 Passwords Internet of Things Data Management Gmail Productivity VoIP Gadgets Word Vulnerability Remote Monitoring App Artificial Intelligence Quick Tips Infrastructure Encryption Managed Service Chrome Apps Applications Website Router BYOD Company Culture IT Support Money Settings Tip of the week Managed Service Provider Save Money Employer-Employee Relationship Virtual Reality Access Control Analytics VPN Storage IT Management Data Security Paperless Office Office Tips Government Virtual Private Network Computers Unified Threat Management Hacker Data storage Big Data Employee-Employer Relationship Display Collaboration Firewall Maintenance Avoiding Downtime Remote Workers Robot Information Technology Antivirus Development Google Drive Bandwidth Automation Content Filtering Networking HIPAA YouTube BDR Risk Management Education Apple Business Technology SaaS Printing Server Management Password Touchscreen Business Intelligence iOS Wi-Fi Virtualization Laptop Managed IT Holiday The Internet of Things Tablet Data loss Telephone Systems Retail Alert desktop Augmented Reality Spam Computing Downtime MSP Outlook WiFi Two-factor Authentication Marketing Managing Stress Bring Your Own Device Operating System Social OneNote Monitors LiFi Managed IT Service Vendor Management Humor Data Breach Customer Relationship Management Scam Chromebook Hosted Solution Document Management IT Administration Best Practice Windows 7 Wireless Solid State Drive Mouse Software as a Service Break Fix Social Network End of Support Search Mobile Security Remote Computing Hard Disk Drive Bitcoin Monitoring Solid State Drives Network Congestion Running Cable Work Dell Google Wallet Shortcuts Mobile Management Cyber Monday Smart Tech Payment Card Cooperation Service Level Agreement Cabling Streaming Processor Legislation Buisness Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Logistics Virtual Desktop Hotspot Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Writing Sports Compliance Legal Hybrid Cloud Microsoft Excel Windows 8 Spying National Security Techology IT Technicians Optimization Unified Communications Drones Security Cameras Profiles Smart Technology Connectivity Students How To Lenovo Dark Data Update Inventory Staff Leominster Human Error Memory Statistics Modem FinTech Analysis Asset Management Language Value Mobile Device Management Virus Downloads Regulations Deep Learning Scalability Conferencing Mail Merge Blockchain Digital Payment Updates VoIP Unified Threat Management Mirgation Recycling Managed Services Utility Computing Shortcut Distributed Denial of Service Politics IoT Mixed Reality Firefox Superfish Customer Service Shadow IT Cybercrime K-12 Schools Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Digital Alt Codes Private Cloud Memes Computing Infrastructure Professional Services LED Threats Office Samsung Social Networking Migration Consulting Address Permissions Star Wars PowerPoint User Error Chatbots eWaste Budget Laptops Patch Management Tech Support Typing Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Nanotechnology Spyware Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Fraud Cost Management Onboarding GDPR Time Management Printer Halloween Identity Continuity Managed Services Provider Websites Cryptocurrency Slack Hard Disk Drives COVID-19 Smart Office Print Toner Myths Black Friday Screen Reader Charging Identity Theft Emergency Holidays Licensing Dongle IT solutions Going Green Content Huawei Servers Google Calendar Safety Wires Training Corporate Profile Google Docs Messaging Assessment Automobile Hacks Digital Signage Data Warehouse Network Management Scary Stories Solar G Suite Entertainment Vendor Dark Web Distribution CrashOverride Cortana Remote Work 3D Printing Regulation Supercomputer Motion Sickness Staffing Administrator Processors Taxes Machine Learning IT Budget Web Server what was your? Unsupported Software GPS Relocation Printers IT Consultant Computer Repair Cameras Mobile Data Recovery Meetings How To Tracking Health Mobile Computing Cleaning Black Market CCTV Webcam Law Enforcement Electronic Medical Records Financial Notifications Error Twitter Physical Security Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3