All Posts by Date or last 15, 30, 90 or 180 days.

As an Amazon Associate I earn from qualifying purchases @AMAZON

Designed for the most demanding needs of photographers and videographers.
Connect and charge all of your devices through a single Thunderbolt or USB-C port.

Software Extensions are an Additional Attack Vector—Avoid Them

When software of any kind is added to a system, a new vector for infection or malware or exploit is part of the deal. Sometimes it’s the new software itself, and sometimes there are things that combine to create a new weakness.

It’s never a good idea to add extensions you do not need. Ars Technica reports on a new trend in Adware vendors buy Chrome Extensions to send ad- and malware-filled updates.

Google Chrome Extensions preference, none installed
Apple Safari Extensions preference, disabled (off)

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | X.com/diglloyd
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__