Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Is Your Web Browser Putting You At Risk? > NetSparsh - Viral Content you Love & Share

Is Your Web Browser Putting You At Risk?

It's free, it comes with Windows and it's used by approximately 94% of the Internet population. It also poses an unacceptable security risk. What am I talking about? If you guessed Internet Explorer, you're right on the money. So, is your web browser putting you at risk? If you're one of the 94% using Internet Explorer, the answer is a definite *yes*. By my math, quite a few people require critical information for protection.

What's the problem with Internet Explorer (known as "IE" from here out) and how does it put you at risk?

The main problem with IE is the numerous security flaws. As an example, between April 2001 and June 2004, Microsoft documented *153 security flaws* in IE. When a security flaw is discovered Microsoft releases information about the flaw and the potential impact. *Usually* at this point Microsoft provides a downloadable security fix to remedy the problem. Since many people don't know about the flaw and the fix, frequently people remain vulnerable for long periods of time.

Just how serious are some of these security flaws? Some of the critical security flaws allow attackers to basically gain control of your computer and run whatever malicious programs they chose. In many cases, your vulnerable computer can be compromised just by visiting the wrong website.

Here are but a few of the malicious programs I've seen loaded on people's computers through security holes in IE:

  • Browser Hijackers. These are programs that do nasty things like change your home page to another page, usually something pornographic in nature. They can also install software and links on your desktop, of course *without* your permission.

  • Spyware. This is extremely devious and malicious software, and in many cases, it's used by criminals for online identity theft. Once it's on your computer, Spyware sits quietly in the background recording information about you. Do you shop and bank online? This is one threat to be extremely concerned about.

What can you do to improve security?

Rather than continue to apply what boils down to "band aid" security fixes to IE, I recommend a more permanent solution. Stop letting IE put you at risk, and switch to another web browser.

How exactly will switching web browsers help? Quite simply, there are so many security exploits on the Internet targeted specifically to IE that just by using another browser, you'll happily avoid most of them.

The good news is that there are several alternative web browsers available free of charge like Netscape, Mozilla, Opera and Firefox. For more information a great website to visit is http://BrowseHappy.com. This website is dedicated to getting people to switch from IE. It's full of "real life" stories about why people switched, and what browser they're using now.

So, what's the best browser of the bunch? Well, it's highly subjective of course, but my vote goes to ?

Firefox, "Rediscover the Web" A new browser called Firefox has quickly become my web browser of choice. First off, Firefox was written to be "lean and mean" and it certainly delivers. It's faster at loading web pages than IE and even provides features not found in IE. Something I suspect will quickly become a favorite feature is called tabbed browsing. Tabbed browsing allows you to load multiple web pages in the same window, and quickly switch between the loaded pages. Tired of pop-ups? Firefox has the best built-in pop-up blocker I've seen. I have yet to see a pop-up get past it. When it comes to security, Firefox receives *high marks*.

Firefox definitely has a positive "buzz" going right now, and it's easy to see why. If you're interested in trying out Firefox, you can download it for free here: http://www.mozilla.org/products/firefox/

I'll conclude by saying that switching browsers is only one of several steps necessary to protect yourself from the many threats on the Internet, but it's certainly a good place to start. Here's to practicing safe computing.

© Doug Partridge - All Rights reserved

About The Author

Doug Partridge is co-author of a new eBook, "How to Secure Your Computer Using Free Tools and Smart Strategies." This is the missing Internet security guide that should have come with your Windows computer, but didn't.

Free Details => http://www.SecureYourComputer.net

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Penn State News

IST students experience tech, culture and personal growth in exchange program
Penn State News
UNIVERSITY PARK, Pa. — Home to global companies like Samsung and LG, South Korea has come a long way technologically since the mid-1980s. Today, it boasts the world's highest internet speeds and most cellphone users, and is therefore often thought ...


GeekWire

Seattle startup vets take on Google with Helm, a new $499 personal email server
GeekWire
It's a bold bet that aims to provide comfort at a time when privacy and security issues related to personal data hosted by big tech companies in the cloud are top of mind. The idea comes from Giri Sreenivas and Dirk Sigurdson, two entrepreneurs who ...
Are consumers worried enough to buy a personal computer server?Hindustan Times
Helm is the personal email server you never knew you neededMashable

all 28 news articles »

New York Times

An Eye for Photography, but a Google Suite for Events
New York Times
How do New York Times journalists use technology in their jobs and in their personal lives? Whitney Richardson, an events manager for The Times in London, discussed the tech she's using. Q. What tech do you use to put together events? A. Over the past ...


USA TODAY

Apple makes it easier to download your personal data
USA TODAY
A few months ago, if you wanted to find out what kind of personal information Apple had collected on you, you needed to navigate to Apple's privacy website, locate a hard-to-find tab to request the info and await its arrival. That changes today, with ...
Apple Personal Data download: How to get your stuffSlashGear
Apple Is Now Allowing You To Download Your Personal DataWccftech
Privacy - AppleApple
ZDNet
all 55 news articles »

Beware Facebook hoax tricking people into thinking accounts hacked
The Oakland Press
Then, they send a bunch of friend requests to the original account's friend list, to try to scam the person's unsuspecting friends into granting access to their personal information by accepting the request. While account cloning is a real thing, the ...


New York Times

It's Her Job to Get More People to Act Like You Right Now
New York Times
How do New York Times journalists use technology in their jobs and in their personal lives? Millie Tran, a global growth editor for The Times, discussed the tech she's using. Q. You're the first-ever global growth editor at The Times. What does a ...


Madison.com

The case for rotating out of major tech stocks
Madison.com
CEO of Exponential ETFs Phil Bak tells CNN's Richard Quest why he thinks it's time for investors to consider taking some profits from FAANG and putting their money elsewhere. Tags. Wire · Cnn · Facebook · Twitter · Email; Print; Save. View comments ...


CNN

Hackers accessed personal information of 30 million Facebook users
CNN
New York (CNN) Almost 30 million Facebook users' phone numbers and email addresses were accessed by hackers in the biggest security breach in the company's history, Facebook said Friday. The attackers accessed even more details on 14 million of ...
Facebook says hackers saw personal info of 14 million peopleNBCNews.com
Facebook hack update: Nearly 30 million users' data stolen. How to find out if you're one of themUSA TODAY
Facebook Hackers Accessed Personal Data From 29M AccountsBillboard
CNET -Facebook -Facebook -Facebook Newsroom
all 1,325 news articles »

TechCrunch

Journal raises $1.5 million to bring Google-like search to your personal life
TechCrunch
As with most tech products these days, it comes down to how much do you trust the company and how much do you care about your data? And depending on who you are, you may have a stronger threat model — that is, what threats you face based on who ...


New York Times

The Google Pixel 3 Review: Phone's Smarts Shine Through Its AI-Driven Camera
New York Times
Apple and Samsung typically show off glitzy hardware innovations — dual-lens cameras; bigger screens — to mesmerize millions into buying their new smartphones. Google has taken a different approach: It wants to sell people on better software. That ...
YouTube HTML5 Video PlayerYouTube
Pixel Buds Real-Time Translations Available on All Google Assistant HeadphonesDroid Life
Translate with Google Pixel Buds - Google SupportGoogle Support
Google Product Forums
all 378 news articles »
Google News

CCNA 640-801 Certification Primer

The Cisco Certified Network Associate (CCNA) Certification is meant for... Read More

Use Your Computer For Your Entertainment Needs

By using your computer today you can find a lot... Read More

Three Things You Can Do to Keep Your Computer Running at Maximum Performance

Although there are many things that can affect the performance... Read More

Computer Performance Tips

Introduction In this article I will clearly spell out the... Read More

How to Use SQLXML to Retrieve Data from SQL Server Database?

Using SQL Server 2000 and above versions you can retrieve... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

DVD The Ultimate Consumer Digital Media

Digital Video Disc or as it is sometimes referred to... Read More

Palm PC critique

I met an entrepreneur who hole heartedly disagree with an... Read More

More Cool Web Tricks

If you ask most people what frustrates them most about... Read More

Wordpress Plugins

Maybe you always wanted a feature that hasn't been available... Read More

Got Virus?

GOT VIRUS? Your Data is NOT lost forever!In the wake... Read More

What?s the Difference Between Plasma TVs and LCD TVs?

Plasma and LCD TVs are the latest trend in home... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

10 Tips to SPEED Up Your PC

1. Let your PC boot up completely before opening any... Read More

Why There Are Color Differences in Printing from Your PC

This article describes the basic properties of color, what the... Read More

Your Home is in Your Hands

I would like to tell you about a magic home.... Read More

Learn the Lost Art of Touch Typing

Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More

Help, I Need a New HDTV! (Part 1 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Help, I Need a New HDTV! (Part 3 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Help, I Need a New HDTV! (Part 5 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

Password Nightmares

Good Morning Mr. Sampson. Please type in you Personal Identification... Read More

Cisco Certification: Building Your Home Lab, Part II

In the first part of this home lab tutorial, CCNA... Read More

The Best MP3 Players Under $100

You don't have to fork out $250 for a super-diggy-whizbang... Read More

What Are You Looking For In A Cheap MP3 Player?

Are you stymied by the vast offerings in cheap mp3... Read More