Thursday, February 27, 2025
HomeCyber Security NewsMalwarebytes New Browser Extension That Protects you From Visiting Malicious Websites

Malwarebytes New Browser Extension That Protects you From Visiting Malicious Websites

Published on

SIEM as a Service

Follow Us on Google News

Malwarebytes introduced a new Malwarebytes Browser Extension for Chrome and Firefox to block malicious websites and to filter unwanted contents.

It makes browsing safe by blocking pop-ups, browser hijackers, browser lockers, fake news contents, clickbait links and in-browser cryptocurrency miners.

Malwarebytes Lists Protection Features

Malware protection: Blocks malicious programs or code that can damage your system.

Scam protection: Blocks online scams, including technical support scams, browser lockers, and phishing.

Advertising/tracker protection: Blocks third-party ads and third-party ad trackers that monitor your online activity. The number of blocked ads/trackers for a website will show beside the Malwarebytes logo in your browser.

Clickbait protection: Blocks content and websites that often display behavior of questionable value.

Potentially unwanted program (PUP) protection: Blocks the downloading of potentially unwanted programs, including toolbars and pop-ups.

Malwarebytes Browser Extension for Chrome and Firefox

The extension is available with Chrome Webstore and Firefox Add-ons page. Installing the extension is simple and straightforward.

You can customize the protection features from the setting menu and with Allow list tab you can choose to allow the individual domains and IPs manually, in case if it is blocked.

When the extension blocks a site it shows warning “we strongly recommend you do not visit the site” and offers an explanation about the risk associated.

Malwarebytes says the most complaints or the extensions is false positives, “We hope to be able to announce the full, official version of the Malwarebytes Browser Extension soon.”

Also Read

Investing in Fraud Detection Software – Is It Worth the Expense?

Employees Actively Seeking Ways to Bypass Corporate Security Protocols in 95 % of Enterprises

Best Way to Accelerate and Secure Your Website From Top Common Web Threats

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...