Blog Layout

How to Make Sure Your Browser Extensions Are Safe

Jan 30, 2022

BROWSER EXTENSIONS CAN  be hugely useful, plugging gaps in functionality, adding cool new features and options, and generally just making life on the web more convenient.

At the same time, they have the potential to be a serious security risk—many ask to see everything you see online, some change key settings inside your browser, and they can operate and communicate with their developer (or with advertisers or other parties) in the background without your knowledge.

We don’t want to discourage you from using your favorite extensions, but you should definitely make sure the ones you’re using are safe.

First, all the usual rules apply: Keep your computer and its applications up to date. Run regular malware scans. That’ll go a long way toward minimizing the risk posed by potentially dodgy extensions. Beyond those tips, here’s how to run an audit.

How to Spot Threats Early

Identifying a bad browser extension isn’t an exact science, but there are some general pointers to follow. Always do your research before installing an add-on—check the reviews from other users and reviews on the web, if there are any. See when the extension was last updated, as really old and out-of-date tools can be less secure than newer ones, and definitely look for indications that the add-on has changed hands recently.

It’s important to make sure that the extensions you install come from official repositories, such as the  Chrome Web Store  or the  Firefox Browser Add-Ons  portal. It gives you some degree of certainty that the software you’re installing is legitimate and safe, so be a bit warier of extensions that you find elsewhere.

We’re not saying that new, unreviewed add-ons from unknown developers are bad, but you should be extra careful of them—can you find anything out about the company or the person behind the tool? Is it clear how the extension is being funded, or is it a passion project? What clues can you get from the website linked on the extension listing page, for example?

Double-check the permissions that an add-on is asking for. In some cases (Firefox), they’ll be listed on the extension page on the web; in others (Chrome), you won’t see them until you’re installing the software. Be on the lookout for any permission requests that seem unreasonable or strange considering what the add-on is supposed to do.

 

How to Check Chrome Extensions
screenshot
Extensions in Chrome.   SCREENSHOT: DAVID NIELD VIA GOOGLE

To see the extensions you have installed in Chrome, click the three dots (top right), then choose  More Tools  and  Extensions . Click  Details  next to any extension to reveal more information about it, including the browser permissions it needs to run and how much space it takes up on disk

There’s also a list of websites the extension is allowed to access—this will typically be  On all sites , but you can restrict it to  On specific sites  to limit the add-on to certain pages. To have the extension ask for permission to work its magic every time it needs access to a site, select the  On click  option.

Extensions that you’re not 100 percent sure about can be temporarily disabled using the toggle switch at the top of its individual settings page. If you want to get rid of an extension completely, select  Remove extension  and then  Remove .

 

How to Check Chrome Extensions
screenshot
Extensions in Firefox.   SCREENSHOT: DAVID NIELD VIA MOZILLA

Fire up Firefox, and click the menu button (three horizontal lines, top right), then  Add-ons and Themes  and  Extensions  to get to your extensions. You’ll see currently installed extensions, plus some recommended ones that Firefox thinks you’ll like. Click on any extension toggle switch to disable or enable it.

Select an extension to see some details about it, including user reviews, a link to its website, and its developer. From the same screen, you can set whether or not an extension can update itself, and whether or not it can run in private (incognito) windows.

Switch to the  Permissions  tab to see exactly what a Firefox add-on is allowed to do on your system. If you decide an extension has overstayed its welcome, click the three dots to the top right then  Remove  and  Remove  again.

 

How to Check Microsoft Edge Extensions
screenshot
Extensions in Edge.   SCREENSHOT: DAVID NIELD VIA MICROSOFT

Microsoft Edge is based on the same code as Google Chrome, so there are some similarities in the process here. Click the three dots in the top right-hand corner of the interface, then Extensions to get to the main list.

The toggle switches let you enable and disable extensions without actually removing them—you can get rid of them by clicking  Remove  and then  Remove  again. To learn more about an extension you’ve installed, click on  Details .

On the Details page, you’re able to see the permissions granted to an extension and which sites it has access to (usually all of them, for most extensions). The same page lets you set whether or not an extension can run in Edge’s InPrivate mode.

 

How to Check Safari Extensions
screenshot
Extensions in Safari.   SCREENSHOT: DAVID NIELD VIA APPLE

In Safari on macOS, open the  Safari  menu and select  Preferences , then switch to the  Extensions  tab. All of your installed add-ons are listed here, and the currently active ones will have a blue tick next to them.

To discover more about a particular extension, click on it—you’ll be able to see the add-on’s permissions and the sites it’s allowed to access, where applicable (most extensions want access to all the sites you visit). You can adjust the sites setting, but you can’t change the permissions.

If you decide that you’re not comfortable with having a particular extension installed, click  Uninstall . If the extension is part of a bigger macOS app, you’ll be directed to Finder to get rid of the application completely.

26 Apr, 2024
In continuation of Microsoft’s series of data security incidents, employees accidentally exposed internal data to the public. The leak exposed an unprotected Azure storage server containing code, scripts, and configuration files. Microsoft has announced that it has fixed a security breach that exposed internal company credentials and files to the open internet. The breach was first discovered by security researchers from cybersecurity firm SOC Radar. According to their report, an internal error resulted in an Azure storage server without password protection being given public access. The exposed data was primarily related to Microsoft’s Bing search engine, including configuration files, code, and scripts that employees used to access a range of internal systems and databases. Consequently, bad actors could identify and access locations for Microsoft's internal data. So far, it has not been made clear how long the data has been exposed. Anuj Mudaliar Assistant Editor - Tech, SWZD opens a new window opens a new window Anuj Mudaliar is a content development professional with a keen interest in emerging technologies, particularly advances in AI. As a tech editor for Spiceworks, Anuj covers many topics, including cloud, cybersecurity, emerging tech innovation, AI, and hardware. When not at work, he spends his time outdoors - trekking, camping, and stargazing. He is also interested in cooking and experiencing cuisine from around the world.
26 Apr, 2024
AT&T is notifying 51 million former and current customers, warning them of a data breach that exposed their personal information on a hacking forum. However, the company has still not disclosed how the data was obtained. These notifications are related to the recent leak of a massive amount of AT&T customer data on the Breach hacking forums that was offered for sale for $1 million in 2021. When threat actor ShinyHunters first listed the AT&T data for sale in 2021, the company told BleepingComputer that the collection did not belong to them and that their systems had not been breached. Last month, when another threat actor known as 'MajorNelson' leaked the entire dataset on the hacking forum, AT&T once again told BleepingComputer that the data did not originate from them and their systems were not breached. After BleepingComputer confirmed that the data belonged to AT&T and DirectTV accounts, and TechCrunch reported AT&T passcodes were in the data dump, AT&T finally confirmed that the data belonged to them. While the leak contained information for more than 70 million people, AT&T is now saying that it impacted a total of 51,226,382 customers. "The [exposed] information varied by individual and account, but may have included full name, email address, mailing address, phone number, social security number, date of birth, AT&T account number and AT&T passcode," reads the notification. "To the best of our knowledge, personal financial information and call history were not included. Based on our investigation to date, the data appears to be from June 2019 or earlier." BleepingComputer contacted AT&T as to why there is such a large difference in impacted customers and was told that some of the people had multiple accounts in the dataset. "We are sending a communication to each person whose sensitive personal information was included. Some people had more than one account in the dataset, and others did not have sensitive personal information," AT&T told BleepingComputer. The company has still not disclosed how the data was stolen and why it took them almost five years to confirm that it belonged to them and to alert customers. Furthermore, the company told the Maine Attorney General's Office that they first learned of the breach on March 26, 2024, yet BleepingComputer first contacted AT&T about it on March 17th and the information was for sale first in 2021. While it is likely too late, as the data has been privately circulating for years, AT&T is offering one year of identity theft protection and credit monitoring services through Experian, with instructions enclosed in the notices. The enrollment deadline was set to August 30, 2024, but exposed people should move much faster to protect themselves. Recipients are urged to stay vigilant, monitor their accounts and credit reports for suspicious activity, and treat unsolicited communications with elevated caution. For the admitted security lapse and the massive delay in verifying the data breach claims and informing affected customers accordingly, AT&T is facing multiple class-action lawsuits in the U.S. Considering that the data was stolen in 2021, cybercriminals have had ample opportunity to exploit the dataset and launch targeted attacks against exposed AT&T customers. However, the dataset has now been leaked to the broader cybercrime community, exponentially increasing the risk for former and current AT&T customers. Update 4/10/24: Added statement from AT&T about discrepancy in numbers. BILL TOULAS Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.
26 Apr, 2024
Home improvement retailer Home Depot confirmed with multiple publishers that it suffered a data break due to a third-party SaaS vendor inadvertently exposing a subset of employee data. IntelBroker, the threat actor behind the attack claims it has the information of 10,000 Home Depot employees. A Home Depot software vendor suffered a data breach leading to the compromise of an undisclosed number of employees. IntelBroker, the threat actor behind the attack claims it has the information of 10,000 Home Depot employees. Home improvement retailer Home Depot confirmed with multiple publishers that it suffered a data break due to a third-party software vendor inadvertently exposing a subset of employee data. Reportedly, the breach was caused by a misconfigured software-as-a-service (SaaS) application.
More Posts
Share by: