Is my Site Secure?


Browser Vulnerabilities

Vulnerabilities with browsers, such as Google Chrome and Mozilla Firefox, can enable an attacker to take advantage of a flaw or weakness in an operating system or software that intends to breach browser security and modify its settings without the user’s knowledge. Hackers do this by using malicious code to exploit a known vulnerability and cause the browser to run arbitrary code to alter the current setup and/or display a compromised version of the site.

Breaches of web browser security protocols can result in an attacker being able to collect personally identifiable information and install malware or other harmful content to gain access to users’ computers. With browser vulnerabilities becoming more and more abundant, all internet users should ensure that they are using a trusted browser with credible plugins as this should ensure that third party extensions and plugins are flagged as malware where untrusted.

How can I prevent Browser Vulnerabilities being exploited?

To reduce the susceptibility of browser vulnerabilities being exploited, you should abide by the following best practices:
  • Load clean software from a known OS and trusted internet browser
  • Use a hardened browser to prevent attacks via third party software
  • Use a trusted and secure DNS to prevent manipulation
  • Utilise link-checking browser plugins to avoid website-based exploits
  • Utilise anti-malware content and firewalls to avoid malicious content