Attackers are shifting their tactics; they now try to entice you to invite them in using your browser.
Operating System: All
Applies To: UB students, faculty, staff, alumni, retirees and volunteers
Last Updated: September 9, 2016
This method of entry is commonly executed via your Web browser. Often, the attacked will exploit a flaw in a piece of software, known as a plug-in, upon which your Web browser relies, such as a PDF viewer or a Java application. It's often difficult to ascertain exactly which plugins you have present on your computer and which version is the most secure to use.
To help you more easily manage your plug-ins’ security, Mozilla has put together a web page to evaluate what you have installed and its version. It will then let you know if and where any upgrades are available for any plug-ins.
While the following tool is hosted by Mozilla (creators of the Firefox web browser), it should work in any browser.
Although the links below are meant for Firefox Plug-Ins, many are also available for other browsers like Google Chrome.
If you know of a security plug-in that does not appear on this list, please email email@example.com.
While making a browser more secure, each plug-in could potentially encounter problems with certain websites. Be sure to test thoroughly.
Allows active content to run only from trusted sites, and protects against XSS and Clickjacking attacks.
Blocks all Flash content from loading.
Uses filter subscriptions to automatically remove online advertising and blocking all known malware domains.
Allows you to see who's tracking your web browsing and block them.
Shows you which websites are trustworthy based on millions of users' experiences.
Controls what is sent as the HTTP Referrer on a per-site basis.