Secure Browsers Offer Alternatives to Chrome, IE and Firefox

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

The Web browser has been a major infection vector for years, allowing malware to be transported to millions of computers through phishing, man-in-the-middle, SQL injection and countless other attacks. But what if there was a way to stop this madness and secure the browsing channel itself?

The Web browser has been a major infection vector for years, allowing malware to be transported to millions of computers through phishing, man-in-the-middle, SQL injection and countless other attacks. But what if there was a way to stop this madness and secure the browsing channel itself?

There are several key things to look for. First is in understanding your existing browser. When you use Chrome, for example, you agree to let Google track your browsing behavior and offer up search suggestions, send them error reports, track your URLs, and lots more. They claim it is to help improve the user experience, but it also leaves you vulnerable to attacks and records your movements through cyberspace. So a replacement browser should offer some additional privacy components. (There are products that can be used to anonymize your browsing history and protect your identity when you surf online, such as TOR or ZipZap.)

Second, a new browser should be more secure by default and make it difficult for malware writers to inject their code onto your desktops. That seems obvious, but when you consider that the browser is just one piece of a very complex collection of tools, including malware targets such as Flash, Acrobat, Javascript, and others, it can be difficult to cover all the bases.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies