Viewable by the world
Purpose of Knowledge Article
Guide on what Browser Hijackers and best practices against it. Not all
What can Browser Hijacker do?
- Modify the browser's settings without the user's consent
- Change the browser's homepage, often placing a fake search engine
- Redirect the web search engine to a different search engine and/or altering with the result of the search
- Install additional extensions/add-ons that display intrusive popups/ads, collect data, and modify search result
- Track user data without consent, including personal information
- Put the computer at risk and expose the computer to additional malware infections and compromise your privacy and data
- Cause performance issues to the computer
Keep in mind that browser hijacker has common characteristics but varies in their specific impacts and behaviors.
How does Browser Hijacker get installed?
- Maybe bundled with legitimate software you installed
- Download software from untrusted sources
- From email attachment
- Comes in the form of stand-alone software and extensions/add-ons
- Some may look like legitimate software
How to keep yourself safe?
- Caution, caution, caution
- Do research on software and extensions/add-ons before installing them
- Always download from reputable sources
- Keep software updated
- Regularly scan your computer with reputable anti-malware software
Examples of Browser Hijackers:
- Onelaunch
- Wave Browser