Tag Archive for: browser

Browser Makers and EU Face Off Over QWACs


EU Set to Approve Revised ID Framework to Digitize Public Service Access by 2030

Browser Makers and EU Face Off Over QWACs
Quack! (Image: Shutterstock)

A European effort to wrest greater control over the infrastructure underpinning internet encryption has some security experts warning about degraded website security.

See Also: Live Webinar | Education Cybersecurity Best Practices: Devices, Ransomware, Budgets and Resources

The European Union is on the cusp of approving a revised identity framework intended to digitize access to key public services for the majority of Europeans by the start of the next decade (see: European Digital Identity Bill Heads to Final Negotiations).

A section of the nearly complete update to the electronic identification and trust services regulations – better known as eIDAS – imposes a different kind of identity requirement onto web browsers. The goal, say proponents, is to increase online trust by requiring web browsers to display the identity of the organization that owns the site. That would be done by having browsers accept web certificates issued by entities designated by European governments as qualified trust service providers.

The certificates themselves are known as qualified website authentication certificates, or more commonly, QWACs, pronounced the way a duck would say it.

Underneath the arguments of proponents and critics lies ultimately a clashing set of assumptions about the function of web certificates. Proponents say they should be able to guarantee a website is trustworthy. For critics, the icon only means the connection is encrypted.

Quack! There’s a QWAC in the Root Store

Ordinary web users rarely pause to consider web certificates, but they’re a cornerstone of online security. They’re responsible for encrypting traffic as it lurches across the internet, making it safe for e-commerce sites to…

Source…

2023 Browser Security Report Uncovers Major Browsing Risks and Blind Spots


Mar 02, 2023The Hacker NewsBrowser Security

Browser Security

As a primary working interface, the browser plays a significant role in today’s corporate environment. The browser is constantly used by employees to access websites, SaaS applications and internal applications, from both managed and unmanaged devices. A new report published by LayerX, a browser security vendor, finds that attackers are exploiting this reality and are targeting it in increasing numbers (download report here).

The key report findings

  1. Over half of all the browsers in the enterprise environment are misconfigured. While a configured browser is nearly impossible to compromise, stealing data from misconfigured browsers is like taking candy from a baby. The Leading misconfigurations are improper use of personal browser profiles on work devices (29%), poor patching routine (50%), and the use of corporate browser profiles on unmanaged devices.
  2. 3 of every 10 SaaS applications are non-corporate shadow SaaS, and no SaaS discovery/security solution can address its risks. Shadow SaaS, and more than that, shadow identities, are the number one source for enterprise data loss. No existing data security tool (whether it being a traditional DLP or a DSPM) has access or control to what employees can do on their own personal applications.
  3. Attackers adopt evasive attack techniques that neither email security nor network security tools can detect. Advanced browser-borne attack techniques, such as the use of SaaS applications to distribute malware or abusing high-reputation sites for phishing, have become a threat commodity.
  4. Traditional security tools miss over half of those attack vectors at zero hour, making targeted browser attacks into a leading cause for enterprise breaches.
  5. Most browser risks may lead to identity theft. Weak passwords, misconfigurations and SaaS security issues all circulate around the digital identity. This depressing finding outlines a main pain point – the digital identities are still the corporate Achilles heel.

The report also details the top browser security threats of 2022, which include phishing attacks via high reputation domains, malware distribution via file sharing systems, data leakage exploiting…

Source…

How your browser could be exposed to a security risk


One thing you shouldn’t take for granted is the version of the browser you’re using to surf the web. Always be sure to keep your web browser up to date. 

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER

This will fix the many security issues that seem to come with each version and ultimately help prevent hackers from getting into your computer, crashing programs and getting around your computer’s security systems.

While there are many browsers out there, below are a few of the more popular ones.

5 phone apps that offer free long-distance calls anywhere, anytime

Make sure your web browser isn't exposed to security risks.

Make sure your web browser isn’t exposed to security risks. (CyberGuy.com)

How to update your Chrome browser

Mac

  • Open your Google Chrome browser
  • Select the 3 vertical dots in the top right corner
  • Click Settings
  • Select About Chrome from the Chrome menu on the left
  • Allow it to scan for a most recent update
  • Click Relaunch to complete the update.

Windows

  • Open your Google Chrome browser
  • Select the 3 vertical dots in the top right corner
  • Click Help, then About Google Chrome
  • Select Update Google ChromeNote: If you do not see the “Update Google Chrome” button, then your browser is already updated
  • Click Relaunch to complete.

Android

  • From your phone or tablet, open the Google Play Store app
  • Tap the profile icon from the top right
  • Select Manage apps & device
  • Find Chrome located under “Updates available
  • Tap Update.

iPhone & iPad

  • Launch Apple App Store
  • Tap Profile from the top right (it looks like you or a shape of a person)
  • If you have any apps that need updating, they will be listed under “Available Updates.” If you see Chrome on the list, tap Update
  • Enter your passcode or Apple ID password if prompted
  • Chrome will automatically update when finished downloading.

APPLE COULD OWE YOU UP TO $395 FOR MACBOOK KEYBOARD WOES

Make sure you keep your Safari browser updated.

Make sure you keep your Safari browser updated. (CyberGuy.com)

How to update your Safari browser on a Mac

Safari is a built-in App on all Apple products and will automatically update alongside your device’s software. To check if your Mac computer needs an update:

  • Click the Apple icon in the top left corner of your screen
  • Go to System Settings
  • Click…

Source…

How to Remove the Wave Browser Virus


The Wave browser is a potentially unwanted program (PUP) that installs what looks just like Google Chrome. However, it’s entirely different software that is designed to display unwanted ads and promote the products they wish.

More often than not, users won’t even notice the difference between the Chrome browser and this doppelganger. And what’s worse, it automatically becomes a default browser on your device.

But what are the risks of using Wave browser? While this Wave browser is not exactly a virus or malware, it can make your computer vulnerable to malicious software. The browser can also track your data and make it accessible to cybercriminals.

So how do you identify it and get rid of it? Read our article to learn how to remove Wave browser from your computer.

The easiest way to remove the Wave browser from your device and similar PUPs is to run a full system scan with TotalAV. The tool gives your devices ultimate protection from malware and unwanted programs with strong security and real-time and cloud scanning features.

What is Wave browser?

Is the Wave browser a virus? Not really. The Wave browser is a browser application that resembles Chrome.

Wave browser interface

But experts warn the Chromium-based browser could pose data security and privacy concerns. That’s because the Wave browser contains ads and links that most people consider intrusive and bothersome. It’s these ads and links that could contain a virus or malware.

Once you click on a malicious ad or link, it might turn into a browser hijacker that comprises or controls your device. Those ads or links could also install spyware that gathers and tracks your personal data. Everything you do in your browser, including making payments or logging into bank accounts, becomes a gold mine for cybercriminals. They could also sell your info on the black market.

Here’s a summary of the threats you and your devices could face with the Wave browser.

Type Browser hijacker, adware, PUP (Potentially Unwanted Program)
Device Any device that uses web browsers
Symptoms Changed default search engine, increased amount of adds and pop-ups, redirecting to potentially malicious websites, annoying ads
Damage

Source…