Viewable by the world

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

Purpose of Knowledge Article

Guide on what Browser Hijackers and best practices against it. Not all 

What can Browser Hijacker do?

  • Modify the browser's settings without the user's consent
  • Change the browser's homepage, often placing a fake search engine 
  • Redirect the web search engine to a different search engine and/or altering with the result of the search
  • Install additional extensions/add-ons that display intrusive popups/ads, collect data, and modify search result
  • Track user data without consent, including personal information
  • Put the computer at risk and expose the computer to additional malware infections and compromise your privacy and data
  • Cause performance issues to the computer

It is important to know that browser hijacker has common characteristics but varies in their specific impacts and behaviors.

How does Browser Hijacker get installed?

  • Maybe bundled with legitimate software you installed
  • Download software from untrusted sources
  • From email attachment
  • Comes in the form of stand-alone software and extensions/add-ons
  • Some may look like legitimate software

How to keep yourself safe?

  • Caution, caution, caution
  • Do research on software and extensions/add-ons before installing them
  • Always download from reputable sources
  • Keep software updated
  • Regularly scan your computer with reputable anti-malware software

Examples of Browser Hijackers:

  • Onelaunch
  • Wave Browser
  • No labels