{"id":2819,"date":"2019-08-20T14:55:26","date_gmt":"2019-08-20T21:55:26","guid":{"rendered":"https:\/\/computertechsreno.com\/tips\/?p=2819"},"modified":"2024-11-06T17:11:18","modified_gmt":"2024-11-07T01:11:18","slug":"the-good-and-bad-of-browser-extensions","status":"publish","type":"post","link":"https:\/\/computertechsreno.com\/tips\/the-good-and-bad-of-browser-extensions\/","title":{"rendered":"The good and bad of browser extensions"},"content":{"rendered":"\n<p>You likely spend most of the time on your computer using your web browser. Years ago the web browser was primarily used for reading news and email.  Now we can do everything from grocery shopping, managing finances, word processing, and even work in browser-based versions of powerful business applications &#8211; without leaving a browser window. Part of what has made web browsers so useful &#8211; but also potentially hazardous &#8211; is the popularity of browser extensions.<\/p>\n\n\n\n<p>Browser extensions are applications, often developed by third party developers, that users can download to expand the functionality of their web browsers. A few different extensions that we recommend can block ads, manage passwords, manage too many open browser tabs, or save web pages to Google Drive or Evernote &#8211; just to name a few. However there&#8217;s also an abundance of extensions that promise to do great things, yet cause far more trouble than they\u2019re worth.<\/p>\n\n\n\n<p>Some of these \u201cbad\u201d extensions just cause annoyances, displaying ads or automatically redirecting you to websites that you didn\u2019t intend to browse to. Others are <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/07\/dataspii-inside-the-debacle-that-dished-private-data-from-apple-tesla-blue-origin-and-4m-people\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"more malicious, spying on your browsing, stealing your data (opens in a new tab)\">more malicious, spying on your browsing, stealing your data<\/a>, or injecting malware into your system. What\u2019s worse is that some extensions start out life perfectly legitimate, but then get bought by bad actors and become malicious. <\/p>\n\n\n\n<p>Some of our most common calls for service are due to bad browser extensions.  So how do you get the most out of browser extensions without falling prey to malicious ones? Here are 5 tips:    <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>1. Be very wary of pop-ups advertising an extension.<\/strong><\/h2>\n\n\n\n<p>Many users install extensions because they are prompted to in pop-up messages on websites. You always have the option to decline the extension, or close your browser to avoid installing a persistent installation prompt. If you didn\u2019t go to a website looking to install an extension, it\u2019s best to decline, since a large majority of the time the website is offering something that&#8217;s in their best interest &#8211; not yours.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2. Only download extensions from websites that you trust. <\/strong><\/h2>\n\n\n\n<p>Do some research into the company behind the extension you\u2019d like to download. Many extensions are developed by companies you know, such as Google or Microsoft, and these are generally safe. If you don\u2019t recognize the vendor, be sure to read reviews of the extension on the browser\u2019s extension interface &#8211; such as Chrome\u2019s <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/chrome.google.com\/webstore\/category\/extensions\" target=\"_blank\">Web Store<\/a> or Firefox\u2019s <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/\" target=\"_blank\">Add-Ons<\/a> page. Often malicious extensions will receive enough bad reviews to warn careful users away.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. Take time to read all the fine print.<\/strong><\/h2>\n\n\n\n<p>Whenever you\u2019re downloading extensions, slow down to read all the messages your browser gives you about the extension. Chrome, for example, will show you exactly what information the extension will have access to, as pictured below.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"470\" height=\"186\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2019\/08\/extension-dialog-box.png\" alt=\"\" class=\"wp-image-2820\" srcset=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2019\/08\/extension-dialog-box.png 470w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2019\/08\/extension-dialog-box-150x59.png 150w\" sizes=\"auto, (max-width: 470px) 100vw, 470px\" \/><figcaption class=\"wp-element-caption\">In this example, you\u2019d need to absolutely make sure that you want to give the extension &#8211; a third party app &#8211; access to \u201cread and change all your data\u201d and to \u201ccapture the content of your screen\u201d before clicking \u201cAdd extension.\u201d<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>4. Don\u2019t download extensions bundled with other apps.<\/strong><\/h2>\n\n\n\n<p>We\u2019ve written before about the potential dangers of downloading\/installing free software from the web. In many cases, free software applications will include browser extensions, which the user may download without paying attention, simply because they click \u201cNext\u201d on the installer window without reading the fine print. When downloading anything from the internet, always be sure to read every message carefully so that you are downloading only what you want and expect.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>5. Monitor extension permissions<\/strong><\/h2>\n\n\n\n<p>Be wary of any permission updates from extensions you already have installed. Pay attention to notifications about new permissions, especially if the extension has changed publishers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>6. Block or close prompts to allow websites to send notifications<\/strong><\/h2>\n\n\n\n<p>Though not technically a browser extension &#8211; web browsers have enabled a &#8220;feature&#8221; to allow websites to pop-up notifications from a website, even when you&#8217;ve left that site. Though it may be useful to get notification alerts when you&#8217;re favorite news website is not open, or notifications about new email or Facebook activity &#8211; some untrustworthy websites have abused the feature and are causing excessive pop-ups for unrelated content. We recommend being very judicious if clicking to &#8220;allow&#8221; notifications, and only do so on websites that you know and trust. For more information read: <a rel=\"noreferrer noopener\" href=\"https:\/\/computertechsreno.com\/tips\/how-to-block-browser-notification-pop-ups\/\" target=\"_blank\">How to block browser notification pop-ups<\/a>.<\/p>\n\n\n\n<p>Are you getting excessive pop-ups and getting redirected to websites that you didn&#8217;t intend to visit? Please <a rel=\"noreferrer noopener\" aria-label=\"contact us (opens in a new tab)\" href=\"http:\/\/ctreno.com\/contact\" target=\"_blank\">contact us<\/a> if you need help cleaning up your browser. <\/p>\n\n\n\n<a href=\"https:\/\/computertechsreno.com\/tips\/the-good-and-bad-of-browser-extensions\/print\/\" title=\"Print This Article\" rel=\"nofollow\"><img decoding=\"async\" class=\"WP-PrintIcon\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/plugins\/wp-print\/images\/printer_famfamfam.gif\" alt=\"Print This Article\" title=\"Print This Article\" style=\"border: 0px;\" \/><\/a>&nbsp;<a href=\"https:\/\/computertechsreno.com\/tips\/the-good-and-bad-of-browser-extensions\/print\/\" title=\"Print This Article\" rel=\"nofollow\">Print This Article<\/a>\n","protected":false},"excerpt":{"rendered":"<p>You likely spend most of the time on your computer using your web browser. Years ago the web browser was primarily used for reading news and email. Now we can do everything from grocery shopping, managing finances, word processing, and even work in browser-based versions of powerful business applications &#8211; without leaving a browser window. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,14,4],"tags":[],"class_list":["post-2819","post","type-post","status-publish","format-standard","hentry","category-internet-tips","category-passwords","category-security"],"_links":{"self":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/2819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/comments?post=2819"}],"version-history":[{"count":17,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/2819\/revisions"}],"predecessor-version":[{"id":4027,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/2819\/revisions\/4027"}],"wp:attachment":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media?parent=2819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/categories?post=2819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/tags?post=2819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}