Friday, April 4, 2025
HomeCyber Security NewsMalwarebytes New Browser Extension That Protects you From Visiting Malicious Websites

Malwarebytes New Browser Extension That Protects you From Visiting Malicious Websites

Published on

SIEM as a Service

Follow Us on Google News

Malwarebytes introduced a new Malwarebytes Browser Extension for Chrome and Firefox to block malicious websites and to filter unwanted contents.

It makes browsing safe by blocking pop-ups, browser hijackers, browser lockers, fake news contents, clickbait links and in-browser cryptocurrency miners.

Malwarebytes Lists Protection Features

Malware protection: Blocks malicious programs or code that can damage your system.

Scam protection: Blocks online scams, including technical support scams, browser lockers, and phishing.

Advertising/tracker protection: Blocks third-party ads and third-party ad trackers that monitor your online activity. The number of blocked ads/trackers for a website will show beside the Malwarebytes logo in your browser.

Clickbait protection: Blocks content and websites that often display behavior of questionable value.

Potentially unwanted program (PUP) protection: Blocks the downloading of potentially unwanted programs, including toolbars and pop-ups.

Malwarebytes Browser Extension for Chrome and Firefox

The extension is available with Chrome Webstore and Firefox Add-ons page. Installing the extension is simple and straightforward.

You can customize the protection features from the setting menu and with Allow list tab you can choose to allow the individual domains and IPs manually, in case if it is blocked.

When the extension blocks a site it shows warning “we strongly recommend you do not visit the site” and offers an explanation about the risk associated.

Malwarebytes says the most complaints or the extensions is false positives, “We hope to be able to announce the full, official version of the Malwarebytes Browser Extension soon.”

Also Read

Investing in Fraud Detection Software – Is It Worth the Expense?

Employees Actively Seeking Ways to Bypass Corporate Security Protocols in 95 % of Enterprises

Best Way to Accelerate and Secure Your Website From Top Common Web Threats

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...