Secure web services

If there's one thing the Snowden leaks have shown us, it's that security and privacy are largely an illusion.

WhiteHat’s Aviator combines excellent features with the popular Disconnect plugin.

WhiteHat’s Aviator combines excellent features with the popular Disconnect plugin.

If there's one thing the Snowden leaks have shown us, it's that security and privacy are largely an illusion. Yet, it's still possible to make it harder not just for criminals and hackers but also questionable government agencies with the right tools. Unfortunately, one of the key programs we all use to interface with the net is also the one of the primary vectors of attack -- the humble web browser.

Beyond exploits in the browser itself, web browsers can inadvertently deliver malware through drive-by downloads, trick users to install software via social engineering, and build identifiable profiles of users via tracking, all of which are a threat to the business environment when these users are sitting behind your firewall and on your network.

So it's no surprise that, as a result -- and especially after the events of the past year -- browsers with a stronger focus on security and privacy are becoming more popular.

Secure browsers
It's telling the browsers like Firefox, Chrome, IE, and Safari will all do the same job in much the same way. A browser isn't chosen for how it renders pages anymore, instead it's about the other features it provides -- or in the case of trying to ensure security and protect privacy -- sometimes the features it doesn't provide.

On the whole the major players have made efforts in recent years to better secure their browsers and enable options on privacy for users, though the depth and breadth of these features differs between vendors. IE 10 for example enables Do No Track by default (see Microsoft's test page here to test your browser), Chrome integrates phishing and malware detection (and conversely buries its Do Not Track option in Advanced Settings and is disabled by default -- no surprise since this works against the business model), and Firefox sports a wealth of privacy features (with Mozilla boasting that it's 'The most trusted internet company for privacy').

But the big players aren't the only option. It's not common knowledge, but Google's popular Chrome browser is developed through an open-source project called Chromium. You can download Chromium builds for Windows, Linux and MacOS X and these are identical to Chrome builds with the following exceptions: there's no auto-update system, no integrated Flash, no communication to Google servers on usage statistics or search terms, and no RLZ tracking (used for promotional campaigns).

Its open-source nature also means others can take this base and build a new browser around it, which unsurprisingly is exactly what some of the following browsers we're about to cover have done.
So what are the alternatives and how do they differ? Lets take a look.

Secure browsers

Secure search

Join the CSO newsletter!

Error: Please check your email address.

Tags hackersweb browserssecurityattacksSnowden leakscriminalsmalwareprivacy

More about ----AdvancedAppleCacheComodoCSODoubleClickEFFElectronic Frontier FoundationEnex TestLabGoogleKDEKDELinuxMicrosoftMozillaWikipediaYahoo

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Ashton Mills

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts