All Posts by Date or last 15, 30, 90 or 180 days.

As an Amazon Associate I earn from qualifying purchases @AMAZON

Designed for the most demanding needs of photographers and videographers.
Connect and charge all of your devices through a single Thunderbolt or USB-C port.

Software Extensions are an Additional Attack Vector—Avoid Them

When software of any kind is added to a system, a new vector for infection or malware or exploit is part of the deal. Sometimes it’s the new software itself, and sometimes there are things that combine to create a new weakness.

It’s never a good idea to add extensions you do not need. Ars Technica reports on a new trend in Adware vendors buy Chrome Extensions to send ad- and malware-filled updates.

Google Chrome Extensions preference, none installed
Apple Safari Extensions preference, disabled (off)
View all handpicked deals...

Seagate 22TB IronWolf Pro 7200 rpm SATA III 3.5" Internal NAS HDD (CMR)
$500 $400
SAVE $100

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | X.com/diglloyd
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__