Is that Chrome extension filled with malware? • Blisstech Solutions

You’re probably familiar with extensions if you use Google Chrome in your business. These valuable tools can enhance your browsing experience in countless ways, from blocking annoying ads to reducing distractions.

Extensions are popular because they can add so much functionality to your browser. But just as you need to be careful when installing new apps on your phone, you must also be cautious when adding new extensions to your browser. That’s because they come with a risk of malware.

It’s short for malicious software – any software intentionally designed to cause damage to a computer, server, or network. Cybercriminals use malware to steal data, hijack systems, and even empty your bank accounts.

Google Chrome holds about 65% of the browser market share worldwide, making it the most popular browser by far. This popularity makes Chrome a prime target for cybercriminals. While cyber-attacks sometimes exploit vulnerabilities in the browser itself, there’s an easier way to target Chrome users: Through malicious extensions containing malware.

Although Google monitors its Chrome Web Store closely, the risk remains. A recent report claims that 280 million people installed a malware-infected Chrome extension between July 2020 and February 2023. That’s a huge number and highlights the importance of being vigilant.

Surprisingly, many malicious extensions remained available for download on the Chrome Web Store for a long time. On average, malware-filled extensions stayed up for 380 days, while those with vulnerable code were available for about 1,248 days. One particularly notorious extension was downloadable for eight and a half years before removal.

So, how can you protect yourself and your business from these malicious extensions? We recommend these five steps.

  1. External reviews: Since checking ratings and reviews on the Chrome Web Store isn’t always reliable (many malicious extensions don’t have reviews), look for external reviews from trusted tech sites to judge whether an extension is safe.
  2. Permissions: Be cautious if an extension asks for more permissions than it should. If a new extension requests extensive access to your data or system, this could be a red flag.
  3. Security software: Use robust software to catch malware before it can do any harm. This is your last line of defence if you accidentally install a malicious extension.
  4. Necessity: Before installing any new software or browser extensions, consider whether you really need it. Often, you can achieve the same functionality visiting a website.
  5. Trusted sources: Only install extensions from trusted sources or well-known software providers. This significantly reduces the risk of downloading a harmful extension.

Chrome is the most popular browser, which means it will always be a target for cybercriminals. Google’s security team works hard to review every Chrome extension to ensure its safety, but it’s still crucial to be vigilant.

If you’re unsure whether your extensions are safe or you’d like more advice on keeping your business secure, our team can help. Get in touch.

More Content

It’s nearing the end for Windows 10 – Are you ready?

It’s time to say goodbye to Windows 10 Next year, we’ll say a final farewell to Windows 10 as it reaches the end of its life. Microsoft is stopping support. This means no new tools or features and no more security updates. If you’re still using Windows 10 in your...

Tech Tip: How to Tidy up Copied Data in Excel

This Tuesday Two Minute Tech-tip shows you how to tidy up data in Excel spreadsheets. Do you have data in a messy format and need to change it so it is organised? Have you ever received data in Excel or in a text file or Word document and wanted to change it from rows...
Warning: Don’t ignore hardware requirements for Windows 11

Warning: Don’t ignore hardware requirements for Windows 11

Do you love keeping your employees happy by allowing them to work remotely? Or do you think everyone is more productive in the office? Businesses are divided on this right now… here are some important considerations before you decide what’s best for your team.

A woman on a laptop with a shield and lock on the screen

Why you should use a password manager

Introduction It can be difficult to keep track of all of your online passwords, especially if you have multiple accounts for different purposes.  But did you know that there is a way to keep all of your passwords safe and secure? A password manager such as LastPass...
Security Awareness Training Thumbnail Image

Human Error: The Achilles’ Heel of Your Cybersecurity

Small and medium-sized businesses (SMBs) are prime targets for cyberattacks, and the most vulnerable element in their defence is their workforce. Effective cybersecurity awareness training is essential for every employee across your organisation. But to implement it...
If Microsoft can pull this off, it’ll change your workflow forever

Windows Agent Arena – If Microsoft can pull this off, it’ll change work forever

Wouldn’t it be great if your Windows 11 computer could handle tasks like a real-life assistant? Soon it might be able to and we’ll tell you all about it here.

IT Security Still Top Concern For SMBs

A new report from Kaseya reveals that IT Security is still the top concern for small and medium-sized businesses.  The “2019 State of IT Operations for Small and Midsize Businesses” survey took input from more than 400 global respondents and reveals that 32% of...
Here’s what’s in store for the last ever Windows ‘Moments’ update

Here’s what’s in store for the last ever Windows ‘Moments’ update

Microsoft will start to roll out its last Windows 11 ‘Moments’ update in a few weeks. After that it’s back to annual updates. We have all the details of the ‘Moments 5’ features you won’t want to miss. .

Getting Started With Microsoft Teams

Microsoft Teams is a powerful collaboration tool and is included with all business versions of Microsoft 365.  If you have Microsoft 365, and are not using Teams, or you don't yet have Microsoft 365 and want to know what Teams can do, this video is a quick...

Stop! And think, before you act on that email

Don’t fall victim to cyber criminals. We explain what a BEC attack is and how to protect your business.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05