Monday, January 20, 2025
HomeCyber Security NewsMalwarebytes New Browser Extension That Protects you From Visiting Malicious Websites

Malwarebytes New Browser Extension That Protects you From Visiting Malicious Websites

Published on

SIEM as a Service

Follow Us on Google News

Malwarebytes introduced a new Malwarebytes Browser Extension for Chrome and Firefox to block malicious websites and to filter unwanted contents.

It makes browsing safe by blocking pop-ups, browser hijackers, browser lockers, fake news contents, clickbait links and in-browser cryptocurrency miners.

Malwarebytes Lists Protection Features

Malware protection: Blocks malicious programs or code that can damage your system.

Scam protection: Blocks online scams, including technical support scams, browser lockers, and phishing.

Advertising/tracker protection: Blocks third-party ads and third-party ad trackers that monitor your online activity. The number of blocked ads/trackers for a website will show beside the Malwarebytes logo in your browser.

Clickbait protection: Blocks content and websites that often display behavior of questionable value.

Potentially unwanted program (PUP) protection: Blocks the downloading of potentially unwanted programs, including toolbars and pop-ups.

Malwarebytes Browser Extension for Chrome and Firefox

The extension is available with Chrome Webstore and Firefox Add-ons page. Installing the extension is simple and straightforward.

You can customize the protection features from the setting menu and with Allow list tab you can choose to allow the individual domains and IPs manually, in case if it is blocked.

When the extension blocks a site it shows warning “we strongly recommend you do not visit the site” and offers an explanation about the risk associated.

Malwarebytes says the most complaints or the extensions is false positives, “We hope to be able to announce the full, official version of the Malwarebytes Browser Extension soon.”

Also Read

Investing in Fraud Detection Software – Is It Worth the Expense?

Employees Actively Seeking Ways to Bypass Corporate Security Protocols in 95 % of Enterprises

Best Way to Accelerate and Secure Your Website From Top Common Web Threats

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS

Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request...

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...

New IoT Botnet Launching Large-Scale DDoS attacks Hijacking IoT Devices

Large-scale DDoS attack commands sent from an IoT botnet's C&C server targeting Japan and...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS

Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request...

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...