#secure-browsers

[ follow ]
Information security
fromThe Hacker News
2 days ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
Roam Research
fromThe Hacker News
1 day ago

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

Webloc is a global geolocation surveillance system used by various law enforcement agencies, providing access to data from millions of mobile devices.
Privacy professionals
fromFast Company
1 day ago

This iPhone trick lets you use ChatGPT without the privacy risks

Using AI chatbots poses risks to privacy and data security, but Siri can help mask identity when accessing ChatGPT on iPhones.
Deliverability
fromZDNET
3 days ago

How a burner email can protect your inbox - setting one up one is easy and free

A burner email address protects against spam and phishing by providing a temporary, disposable option for account creation.
Web development
fromComputerworld
2 days ago

Chrome, Vivaldi, and the challenge of changing browsers

Switching from Chrome to Vivaldi can enhance productivity and optimize digital environments for users seeking better browser experiences.
Artificial intelligence
from24/7 Wall St.
2 days ago

The Real Reason Cloudflare Is Down 11% Today Has Nothing to Do With Insider Selling

Insider selling at Cloudflare is routine and does not indicate trouble; the real concern is competition from Anthropic's new AI offerings.
Apple
fromTheregister
3 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
#linkedin
Law
fromArs Technica
3 days ago

LinkedIn scanning users' browser extensions sparks controversy and two lawsuits

LinkedIn faces lawsuits alleging lack of user consent for data collection practices.
Privacy technologies
fromTech Times
6 days ago

LinkedIn 'BrowserGate' Investigation Alleges Secret Browser Extension Scanning Within Platform

LinkedIn allegedly collects extensive user data through a hidden system called 'Spectroscopy' without explicit user consent.
Law
fromArs Technica
3 days ago

LinkedIn scanning users' browser extensions sparks controversy and two lawsuits

LinkedIn faces lawsuits alleging lack of user consent for data collection practices.
Privacy technologies
fromTech Times
6 days ago

LinkedIn 'BrowserGate' Investigation Alleges Secret Browser Extension Scanning Within Platform

LinkedIn allegedly collects extensive user data through a hidden system called 'Spectroscopy' without explicit user consent.
UX design
fromEntrepreneur
4 days ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
#ai
Information security
fromFortune
1 day ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Tech industry
fromwww.businessinsider.com
5 days ago

Cloudflare and GoDaddy team up to help websites fend off Big Tech's AI bot swarm

Cloudflare and GoDaddy are partnering to help web content creators control AI bot interactions and address revenue loss from AI content scraping.
Information security
fromFortune
1 day ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
fromThe Verge
5 days ago

The case for banning cookie banners

Cookie banners have become bloated and useless, creating a new kind of interaction that means trouble all over the web. The only solution is to get rid of them, and do it now.
Digital life
Mental health
fromwww.theguardian.com
5 days ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
Privacy technologies
fromThe Hacker News
2 days ago

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google's Device Bound Session Credentials enhance security for Chrome users by tying authentication sessions to specific devices, combating session theft.
React
fromInfoWorld
1 week ago

Local-first browser data gets real

Signals provide a performant alternative for reactive state management in front-end development.
#cybersecurity
fromZDNET
1 day ago
Information security

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

fromTechSpot
2 days ago
Information security

Hackers are turning home routers into tools to spy on Microsoft 365 users

Information security
fromSecurityWeek
3 days ago

Google Warns of New Campaign Targeting BPOs to Steal Corporate Data

A financially motivated threat actor, UNC6783, targets BPO organizations to steal sensitive data from high-value companies using social engineering and phishing tactics.
Information security
fromSecurityWeek
4 days ago

US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

The US disrupted a Russian espionage operation using hacked SOHO routers to capture sensitive data from victims.
Information security
fromZDNET
1 day ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromTechSpot
2 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Information security
fromSecurityWeek
2 days ago

Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users

A severe vulnerability in EngageLab's EngageSDK affects cryptocurrency wallet apps, risking exposure of sensitive user information.
Information security
fromSecurityWeek
3 days ago

Google Warns of New Campaign Targeting BPOs to Steal Corporate Data

A financially motivated threat actor, UNC6783, targets BPO organizations to steal sensitive data from high-value companies using social engineering and phishing tactics.
Information security
fromSecurityWeek
4 days ago

US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

The US disrupted a Russian espionage operation using hacked SOHO routers to capture sensitive data from victims.
#chrome-extensions
Web design
fromComputerworld
2 weeks ago

Don't sleep on this powerful new Chrome security booster

Assess Chrome extensions carefully to ensure developer trustworthiness and review permissions, as ownership changes can introduce security risks.
Web design
fromComputerworld
2 weeks ago

Don't sleep on this powerful new Chrome security booster

Assess Chrome extensions carefully to ensure developer trustworthiness and review permissions, as ownership changes can introduce security risks.
fromPopular Science
1 day ago

How to stop your smart TV from tracking you

Smart TVs are capable of tracking user data, including viewing habits and app usage, which can lead to personalized advertising and content recommendations. Users may prefer to limit this tracking to protect their privacy.
Privacy technologies
#firefox
Web frameworks
fromTheregister
2 weeks ago

Firefox 149 brings a free VPN and native dialog boxes

Firefox 149 introduces a split view feature and a built-in free VPN with 50 GB monthly traffic for web content.
fromZDNET
2 months ago
Artificial intelligence

You can turn off Firefox's new AI features with one simple switch - here's how

Web frameworks
fromTheregister
2 weeks ago

Firefox 149 brings a free VPN and native dialog boxes

Firefox 149 introduces a split view feature and a built-in free VPN with 50 GB monthly traffic for web content.
fromZDNET
2 months ago
Artificial intelligence

You can turn off Firefox's new AI features with one simple switch - here's how

#gmail
Information security
fromEngadget
1 day ago

Google adds E2E encryption to Gmail for iOS and Android enterprise users

End-to-end encryption for Gmail on Android and iOS is now available for enterprise users, enhancing privacy and security for email communication.
Information security
fromTNW | Apps
2 days ago

Gmail's end-to-end encryption comes to mobile, a year after its web launch

Google has introduced end-to-end encryption for Gmail on Android and iOS, enabling secure email communication for mobile users.
Information security
fromEngadget
1 day ago

Google adds E2E encryption to Gmail for iOS and Android enterprise users

End-to-end encryption for Gmail on Android and iOS is now available for enterprise users, enhancing privacy and security for email communication.
Information security
fromTNW | Apps
2 days ago

Gmail's end-to-end encryption comes to mobile, a year after its web launch

Google has introduced end-to-end encryption for Gmail on Android and iOS, enabling secure email communication for mobile users.
Privacy technologies
fromTechCrunch
3 days ago

WireGuard VPN developer can't ship software updates after Microsoft locks account | TechCrunch

WireGuard is locked out of its Microsoft developer account, preventing critical software updates for Windows users.
#vpn
Privacy professionals
fromWIRED
2 weeks ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
fromZDNET
1 month ago
Privacy technologies

VPN tricks and tips you didn't know you needed (but definitely do)

Privacy professionals
fromWIRED
2 weeks ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
fromZDNET
1 month ago
Privacy technologies

VPN tricks and tips you didn't know you needed (but definitely do)

Information security
fromTechzine Global
2 days ago

Android trojan linked to Cambodia following anomalous DNS spike

A banking Trojan operating from Cambodia registers 35 new domains monthly, targeting users in 21 countries and exploiting fake apps for fraud.
Privacy technologies
fromArs Technica
3 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Web design
fromFast Company
3 weeks ago

Firefox's cute and fierce new mascot wants to protect you from the internet

Mozilla launches Kit, a fox mascot based on the Firefox logo, to compete in the AI-driven browser market while emphasizing privacy and user control as Firefox's market share declines.
Information security
fromSecurityWeek
2 days ago

Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000

Google released Chrome 147, fixing 60 vulnerabilities, including two critical ones affecting WebML, with significant bug bounties awarded to researchers.
Privacy professionals
fromWIRED
3 weeks ago

If You Don't Have One, I Recommend a Free Dark Web Monitoring Service

Dark web monitoring services track compromised data across public hacker forums and databases to alert users when their personal information appears in breaches, though most breached data is found on the clear web rather than the dark web itself.
Privacy professionals
fromWIRED
4 weeks ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
Privacy technologies
fromBGR
2 weeks ago

9 Reasons You Should Consider Ditching Google Chrome - BGR

Chrome's dominance in the browser market raises privacy concerns due to its ties with Google's advertising business.
Information security
fromThe Hacker News
5 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy technologies
fromZDNET
2 weeks ago

Firefox is adding a free VPN for all users - but can you trust it?

Mozilla is launching a free VPN for Firefox users, available March 24, with limitations on data usage.
Privacy technologies
fromZDNET
3 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
#phishing
Information security
fromTheregister
4 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Privacy technologies
fromTechzine Global
1 month ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
fromZDNET
2 months ago
Information security

1Password's new anti-phishing feature targets your most inescapable vulnerability - here's how

Information security
fromTheregister
4 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Privacy technologies
fromTechzine Global
1 month ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
fromZDNET
2 months ago
Information security

1Password's new anti-phishing feature targets your most inescapable vulnerability - here's how

Gadgets
fromKotaku
1 month ago

Steam AI Warning Chrome Extension Warns You About Slop

A browser extension moves Steam's AI disclosures to the top of game pages, making it easier to identify AI-generated content before wasting time browsing.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy technologies
fromSecuritymagazine
3 weeks ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
#web-browsers
fromZDNET
2 months ago
Gadgets

I found 6 free browsers that make old computers feel surprisingly fast (and they're secure, too)

fromZDNET
2 months ago
Gadgets

I've used nearly every browser available and these are my top 4 (spoiler: Chrome is out)

fromZDNET
2 months ago
Gadgets

I found 6 free browsers that make old computers feel surprisingly fast (and they're secure, too)

fromZDNET
2 months ago
Gadgets

I've used nearly every browser available and these are my top 4 (spoiler: Chrome is out)

#firefox-148
#digital-privacy
Privacy technologies
fromZDNET
4 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
4 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
4 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
4 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
fromComputerworld
2 weeks ago

Chrome encryption bypass discovered: New malware steals passwords and cookies

The bypass requires neither privilege escalation nor code injection, making it a stealthier approach compared to alternative ABE bypass methods.
Information security
#vpn-security
fromZDNET
4 weeks ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
4 weeks ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

Information security
fromZDNET
3 weeks ago

I tested NordVPN's free scam checker against a real threat in my inbox - here's how it did

NordVPN launched a free AI-powered scam checker tool that detects suspicious links, files, text, and images by identifying malicious databases and common scam patterns like scare tactics and artificial urgency.
Privacy technologies
fromZDNET
1 month ago

I've used Tor browser for years, but now I'm using it on my Android phone - here's why

Tor Browser provides maximum privacy and anonymity on Android by routing traffic through encrypted relays, hiding IP addresses and location from websites, ISPs, and governments.
#tor
fromZDNET
2 months ago
Privacy professionals

Why the most private way to browse the web isn't incognito mode (but this instead)

fromZDNET
2 months ago
Privacy professionals

Why the most private way to browse the web isn't incognito mode (but this instead)

Information security
fromTechRepublic
4 weeks ago

Critical Chrome Security Flaws Threaten Billions of Users Worldwide

Google patched two actively exploited zero-day vulnerabilities in Chrome affecting billions of users worldwide, with flaws in graphics rendering and JavaScript execution components.
#browser-security
Information security
fromComputerworld
4 weeks ago

Google warns of two actively exploited Chrome zero days

Critical Chromium browser vulnerabilities with active exploitation require immediate updates across all Chromium-based browsers to prevent drive-by attacks.
fromZDNET
1 month ago
Information security

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Information security
fromComputerworld
4 weeks ago

Google warns of two actively exploited Chrome zero days

Critical Chromium browser vulnerabilities with active exploitation require immediate updates across all Chromium-based browsers to prevent drive-by attacks.
fromZDNET
1 month ago
Information security

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

fromCoindesk
2 months ago

Privacy

This Privacy Notice applies to all personal information processed by CoinDesk, including its affiliates and subsidiaries (" CoinDesk," " we," " us," or " our "). It covers the information CoinDesk collects through the websites, mobile applications, electronic devices, all other products and services we provide, any other services that display this Privacy Notice, all of the associated content, functionalities, and advertising, and when you communicate with us by phone, email, or otherwise (collectively, the " Services ").
Privacy professionals
Information security
fromTechRepublic
1 month ago

Chrome Extension Hijacked to Deliver Malware, Steal Crypto Wallets

QuickLens Chrome extension was compromised to deliver malware, steal cryptocurrency wallet data, and execute ClickFix attacks by stripping security headers and establishing command-and-control communications.
Privacy technologies
fromTheregister
2 months ago

Just the Browser Is just the beginning

Open protocols and free code are constrained by centralized rulemakers and data-harvesting; minimal, policy-respecting browsers and a Small Web can restore user autonomy.
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
fromZDNET
2 months ago

I used one simple script to remove AI from popular browsers (including Chrome and Firefox)

I do not want AI in my web browser. I just don't. I also don't want companies collecting information about me, or sponsored content and product integrations. All those bits make me want to pull my hair out. I like my privacy and want to browse, you know, the old-fashioned way. I do use AI (on occasion), but only locally-installed AI and only for specific purposes (such as learning Python or researching a topic when I don't want to use a standard search engine).
Privacy technologies
Privacy technologies
fromTechCrunch
2 months ago

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

WhatsApp added Strict Account Settings to lock profiles, block unknown media and calls, enable two-step verification, and limit group additions to reduce cyberattack risk.
Privacy technologies
fromEngadget
7 months ago

The best VPN deals: Up to 87 percent off ProtonVPN, Surfshark, ExpressVPN, NordVPN and more

Long-term VPN plans often offer steep discounts, making annual or multi-year subscriptions substantially cheaper while adding privacy and extra security features.
Information security
fromThe Hacker News
1 month ago

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

CL Suite Chrome extension exfiltrates Meta Business Suite and Facebook Business Manager TOTP seeds, 2FA codes, contact lists, and analytics to attacker-controlled servers.
fromFast Company
2 months ago

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
Information security
[ Load more ]