Search
  • Nexix Security Labs

How to use web-extension cautiously

The internet has come a long way since its first workable prototype was introduced in 1960s. Since then, the world has seen many iterations regarding accessibility and browsing experience. To make our lives a little easier, browser extensions were introduced.


Many extensions work in unison to enhance our browsing and try to serve the best as per our taste. But as they say, every coin has a secondary side and browser extensions are no different. While many may seem like harmless, but some of them lurk behind the masks of "Mr. nice" guy so that they can spy on you and steal your data.


There have been some reports that the alleged ad blockers used to inject adware into the user’s browser, pretty ironic right? Not only that, some of the extensions were keylogging web apps which used to log keystrokes and later used them for getting confidential credentials. This alone becomes a contributing factor for various data breaches as well as private data of people being leaked online. Therefore it becomes vital to know the difference between genuine browser extensions and fake ones.


First of all, before installing any web app or browser extension check for its creditability. There are various forums which can guide you to genuine extensions.


Always check public reviews. Look for what people have to say about the product.


If you think that your PC has some shady things going on, there are some really good free malware scanners available which can help you figure out what’s wrong in our system.


Lastly, if you’re a developer and have developed some really cool extensions, get them verified for their security. We at Nexix can help you get done with VA and PT for your web apps so that the only thing that you have to worry about is developing your amazing applications.


For further details reach out to us at contact@nexixsecuritylabs.com


Your Security | Our Concern

61 views

Recent Posts

See All

Why is IoT ransomware being underrated?

IoT ransomware, ignored however are the assaults inescapable? They sure are not the Kardashians, similar to their PC partners. However, there are two key differences. The first PCs strikes Ransomware

nexixwhitewix.png
  • White Instagram Icon
  • White LinkedIn Icon
  • Twitter - White Circle