Skip to main content Skip to main menu Skip to footer

Secure your web browser

Secure your web browser

Decrease Text Size Increase Text Size

Page Article

There is an increasing threat from software attacks that take advantage of vulnerable web browsers. We have observed new software vulnerabilities being exploited and directed at web browsers through the use of compromised or malicious websites. This problem is made worse by a number of factors, including the following:
  • Many users have a tendency to click on links without considering the risks of their actions.
  • Web page addresses can be disguised or take you to an unexpected site.
  • Many web browsers are configured to provide increased functionality at the cost of decreased security.
  • New security vulnerabilities are often discovered after the software is configured and packaged by the manufacturer.
  • Computer systems and software packages may be bundled with additional software, which increases the number of vulnerabilities that may be attacked.
  • Third-party software may not have a mechanism for receiving security updates.
  • Many websites require that users enable certain features or install more software, putting the computer at additional risk.
  • Many users do not know how to configure their web browsers securely.
  • Many users are unwilling to enable or disable functionality as required to secure their web browser.
As a result, exploiting vulnerabilities in web browsers has become a popular way for attackers to compromise computer systems.

How to Secure Your Web Browser

Expert Tip: Make sure you are using the most current version of your web browser. To find out

Microsoft Edge

Microsoft Internet Explorer (IE) is a web browser integrated into the Microsoft Windows operating system. For up-to-date information on security and privacy settings for Internet Explorer, visit

Mozilla Firefox

Mozilla Firefox is a popular third-party browser for Windows, Mac, and Linux. To learn how to keep your information safe and secure with Firefox's private browsing, password features and other security settings, visit

Apple Safari

Apple Safari is installed on its line of computers, tablets, and phones. For information on Safari’s security settings on Apple devices, visit For information on Safari installed on computers, visit and select “Privacy and security” on the menu.

Google Chrome

In 2012, Google Chrome became the most widely used browser worldwide, according to Stat Counter and other sources. For more information on Chrome’s security, safety, and reporting features, visit and select the options displayed under the topic.

Other Browsers

Other web browsers may have similar options to those described above. Please refer to each browser's documentation to determine which options are available and how to make the necessary changes. For example, the links below show where to find the security information for two other web browsers:



Page Footer has no content