Viewable by the world

Purpose of Knowledge Article

Guide on what Browser Hijackers and best practices against it. Not all 

What can Browser Hijacker do?

  • Modify the browser's settings without the user's consent
  • Change the browser's homepage, often placing a fake search engine 
  • Redirect the web search engine to a different search engine and/or altering with the result of the search
  • Install additional extensions/add-ons that display intrusive popups/ads, collect data, and modify search result
  • Track user data without consent, including personal information
  • Put the computer at risk and expose the computer to additional malware infections and compromise your privacy and data
  • Cause performance issues to the computer

Keep in mind that browser hijacker has common characteristics but varies in their specific impacts and behaviors.

How does Browser Hijacker get installed?

  • Maybe bundled with legitimate software you installed
  • Download software from untrusted sources
  • From email attachment
  • Comes in the form of stand-alone software and extensions/add-ons
  • Some may look like legitimate software

How to keep yourself safe?

  • Caution, caution, caution
  • Do research on software and extensions/add-ons before installing them
  • Always download from reputable sources
  • Keep software updated
  • Regularly scan your computer with reputable anti-malware software

Examples of Browser Hijackers:

  • Onelaunch
  • Wave Browser

Additional Resouces