Will Google’s Privacy Sandbox take the bite out of tracking cookies?

We look at the latest developments for Google’s “Project Sandbox”, and explore what’s going to happen to third-party cookies.

Read more

Browser sync—what are the risks of turning it on?

Browser synchronization is a handy feature but it comes with a few risks. Here’s what you should be asking yourself before you switch it on.

Read more

Chrome wants to make your passwords stronger

We take a look at the latest password security feature in version 88 of the Google Chrome web browser.

Read more

WebNavigator Chromium browser published by search hijackers

A mystery Chromium browser recently made a sudden appearance, and is certainly proving popular. But what is it, and where did it come from?

Read more

Browser Guard combats privacy abuse, tracking, clickbait, and scammers

The free Malwarebytes Browser Guard extension combats privacy abuse, user tracking, clickbait, unwanted advertisements, and tech support scammers while offering granular control and faster browsing.

Read more

How to tighten security and increase privacy on your browser

Is your browser secure and private enough by design or do you need to worry about security, privacy, fingerprinting, ads, and cookies yourself?

Read more

Cookies: Should I worry about them?

Are cookies a threat? The answer depends on how much you care about privacy. Learn how to manage cookies and stay in control of your data.

Read more

Drive-by mining and ads: The Wild Wild West

Cryptomining in the browser is all the rage lately. But what are the impacts for users when it is being abused by dubious publishers?

Read more

Explained: user agent

This post explains the pros and cons of using user agents when browsing the world wide web. What does it reveal and why?

Read more

Fireball Chinese malware and you

By now, you might have heard about an adware infection operation that has allegedly spread to 250 million systems called Fireball. The threat intelligence and research teams at Check Point wrote a blog post last week describing the operation, what the threat does the system and the alarming potential the malware has for doing some serious damage. We delve into the worst case scenario with this situation and how to remove Fireball if you are infected.

Read more

Select your language