UR Blog

Privacy and security | UR Browser

Month: January 2018

Spectre allows the execution of malicious scripts via your browser!

meltdown spectre malicious scripts browser

You’ve probably heard of two vulnerabilities recently revealed by a 22-year-old German researcher, a member of Google’s Project Zero team, Jann Horn: Meltdown and Spectre. Continue reading

A new warning against
malicious browser extensions.

malicious-extensions-chrome

Today, Google Chrome holds nearly 60% market share in the world of browsers (followed by FireFox and Internet Explorer, both oscillating at around 13%). A dynamic ecosystem has developed around this market leader. Continue reading

If your computer is slower than usual, it may be the fault of your browser …

If you constantly use your internet browser (especially Chrome), you will probably notice that the more tabs you open, the slower your machine gets. Each open tab consumes resources from your processor.
There are ways to pause unused tabs, such as The Great Suspender, but these are extensions that can cause other issues, even at the security level. Continue reading

Browsers are two-way windows.

browsers are open windows

For most of us, web browsers are an open window to the endless twists and turns of the internet. But these two-way dormers also allow the outside world to intrude, at times, sneakily into our privacy, record our every move on the web so as to understand our aspirations and influence our behaviour, not to talk of simply infecting our machines, by pure desire to harm or to sell us a cleaning solution. Continue reading

Using your browser to save your passwords? Be careful, you could be tracked …

password could be cracked browser

Remembering different passwords for the wide range of sites we visit daily is a real challenge. How many times did you not have to press the “forgotten password” link to generate a new one? Some services have noticed the aberration of the classic password and offer to authenticate via a code received by SMS or a push notification in a dedicated app. This saves you from constantly having to go back through email. This is the most secure technique, which is also found in the double-authentication process. Continue reading

© 2018 UR Blog

Theme by Anders NorenUp ↑