Archives - Web Browser


Stop accepting all cookie requests

We’re used to seeing a quick message asking us for personalized or custom data preferences when we visit a website. Yet as annoying as they may be – bringing you into a habit of clicking ‘accept all’ – it’s worth rejecting these prompts. Granting cookie collection may improve your user experience and allow you to […]

Try Tor bridges if you struggle to connect

A Tor browser prevents someone from monitoring your browsing habits. It’s the best way to stay invisible online without leaving a data trail. However, if you’re using a Tor browser for the first time, it might struggle to connect. There’s an immediate option to try on the loading screen: Click Configure Connection. Try a Bridge […]

Stay with major web browsers

There are many options for browsing the web. A good rule of thumb is to stick with major web browsers that are regularly updated with critical security patches and other features. Mozilla Firefox, Apple Safari, Google Chrome, Microsoft Edge and Opera are all good options in this respect.

Enter your online accounts via web browser instead of links

Phishing is one of the oldest and most effective cyberattack techniques. To reduce your risk of having sensitive data stolen, never click on any emailed or texted links purporting to take you to your account page for a password reset or other modification. Instead, if you’re unsure whether action is merited, navigate to the account […]

Avoid saving your payment information to a website or browser

Saving your payment information can be a great convenience. But data breaches, unfortunately, happen far too frequently. You never know when your information will be part of the next batch of accounts compromised. Take the extra measure and manually input your payment information when you make a purchase online, but don’t elect to save them.

Regularly clear your web cache, cookies and history

Gathering these three items permits web browsers to speed up your experience by loading already saved resources instead of making new copies. Nevertheless, their buildup can create security risks and performance issues. An incident involving Yahoo’s use of cookies exposed many accounts to hijacking. Storage of cookies also requires disk space and CPU resources. It’s […]