UR Blog

Privacy and security | UR Browser

How Does UR Protect You?

promo image UR browser

UR Protects You in Three Ways:

Focusing on three axes—security, anti-tracking and anti-profiling—we explain how UR protects your privacy and keeps you safe online.

Continue reading

Spectre allows the execution of malicious scripts via your browser!

meltdown spectre malicious scripts browser

You’ve probably heard of two vulnerabilities recently revealed by a 22-year-old German researcher, a member of Google’s Project Zero team, Jann Horn: Meltdown and Spectre. Continue reading

A new warning against
malicious browser extensions.

malicious-extensions-chrome

Today, Google Chrome holds nearly 60% market share in the world of browsers (followed by FireFox and Internet Explorer, both oscillating at around 13%). A dynamic ecosystem has developed around this market leader. Continue reading

If your computer is slower than usual, it may be the fault of your browser …

If you constantly use your internet browser (especially Chrome), you will probably notice that the more tabs you open, the slower your machine gets. Each open tab consumes resources from your processor.
There are ways to pause unused tabs, such as The Great Suspender, but these are extensions that can cause other issues, even at the security level. Continue reading

Browsers are two-way windows.

browsers are open windows

For most of us, web browsers are an open window to the endless twists and turns of the internet. But these two-way dormers also allow the outside world to intrude, at times, sneakily into our privacy, record our every move on the web so as to understand our aspirations and influence our behaviour, not to talk of simply infecting our machines, by pure desire to harm or to sell us a cleaning solution. Continue reading

Using your browser to save your passwords? Be careful, you could be tracked …

password could be cracked browser

Remembering different passwords for the wide range of sites we visit daily is a real challenge. How many times did you not have to press the “forgotten password” link to generate a new one? Some services have noticed the aberration of the classic password and offer to authenticate via a code received by SMS or a push notification in a dedicated app. This saves you from constantly having to go back through email. This is the most secure technique, which is also found in the double-authentication process. Continue reading

Questions We Are Commonly Asked About UR

There are several recurring questions we receive about the validity or privacy of UR, and we’d like to address them here today.

computer hard at work

Continue reading

Introducing The Privacy Suite

With 3 Levels of Privacy To Protect You

We are pleased to introduce the Privacy Suite, a built-in tool that lets you easily control your level of privacy, site by site.

high privacy level in privacy suite

In High Privacy, UR turns black and you can browse online without traces.

Continue reading

GDPR: How Businesses Will Be Affected

CCTV cameras looking at couple

Do you know who’s watching you?

What is the GDPR?

On April 27, 2016, the General Data Protection Regulation (GDPR) was adopted in the European Union after four years of negotiations. This law will strengthen data protection for individuals residing in the European Union (EU).

Continue reading

‘WannaCry’ Wakeup Call For Online Security

 

Ransomware - paying for access to files

A massive cyber attack struck the globe last Friday, affecting 150 countries and over 250,000 computers including those of major government organizations and corporate operations. This ransomware dubbed ‘WannaCry’ is fearsome because once it is activated on a device, it encrypts all the files so that they are inaccessible. At that point, it instructs the computer owner to pay a ransom in Bitcoin in exchange for unlocking their files. 

So what can you do to make sure you’re protected against this vicious ransomware?

  • Be a conscious clicker: an email or some other form of message can contain infectious attachments and links that can spread malware onto your device.You can simply hover your cursor over email links to reveal the URL’s destination. If you are not sure, do a search on the sender to find out more and stay on alert.
  • Don’t be forgetful about updates: immediately install updates to your operating system and to all your software as they become available. Such updates for your device’s system are designed to fix vulnerabilities which ransomware can target. 
  • Backing up your files is key: ransomware works with a hacker first encrypting your hard drive, which makes your computer still operable, but the catch is that you can’t access any of your files. If you already have your important files backed up on an external drive, you would not have to pay a hacker to decrypt them if you get attacked.
  • Remain aware on social media: social media is all about connecting and sharing with others. Therefore, it is essential to remain in a security headspace to avoid clicking on infectious downloads when on Facebook, Instagram, or even Snapchat.
  • Always stay official: remember to only download apps from official application stores. This will reduce the probability of downloading a pirated versions of apps that contain infectious malware.

All in all, staying vigilant on the web is the most crucial wisdom. Hackers around the globe are always looking for new ways to make trouble in return for their almighty dollar, so don’t make their lives easy.  Always think twice before clicking and make sure you are using updated versions on your system. If your device becomes affected, get in touch with Europol for assistance in your native language.

Sources

Fortune, http://fortune.com/2017/05/14/ransomware-wannacry-faq/

Owl Detect, https://www.owldetect.com/uk/stay-safe-online/archive/nhs-cyber-attack-what-steps-have-you-taken/

ABC News, http://abcnews.go.com/US/simple-things-protect-ransomware-attacks/story?id=47410339

Low Battery? Your Privacy May Be Compromised

battery status impact on privacy

Your battery status can have an unexpected impact on your privacy

The remaining battery power on your smartphone may reveal your location to websites, concerning privacy-conscious web users. This occurs from a simple HTML web script that repeatedly monitors the status of identifiers and obtains information from the Battery Status API.

Continue reading

« Older posts

© 2018 UR Blog

Theme by Anders NorenUp ↑