
Sign up to save your podcasts
Or
They promise to check your grammar and boost your productivity, but are your browser extensions a hidden backdoor for data theft? A recent wave of attacks saw even popular, verified extensions on Chrome and Edge compromised, turning trusted tools into surveillance weapons that can monitor your activity and steal your data.
Cybersecurity expert CF Fong, Executive Chairman of LGMS Berhad, joins us to break down this underestimated threat. He explains why we must stop seeing extensions as harmless add-ons and treat them as "full-blown software" that require a "zero trust" approach.
We discuss:
Why browser extensions should be treated with the same caution as any software.
The "zero trust" principle: if it's not essential, don't install it.
Why even small businesses are targets for automated, large-scale cyber attacks.
Key preventative measures businesses can take beyond just technology.
How to spot suspicious permission requests before you click "okay."
For business owners, IT managers, and everyday users, this is an essential guide to understanding and mitigating a commonly overlooked cybersecurity risk.
See omnystudio.com/listener for privacy information.
They promise to check your grammar and boost your productivity, but are your browser extensions a hidden backdoor for data theft? A recent wave of attacks saw even popular, verified extensions on Chrome and Edge compromised, turning trusted tools into surveillance weapons that can monitor your activity and steal your data.
Cybersecurity expert CF Fong, Executive Chairman of LGMS Berhad, joins us to break down this underestimated threat. He explains why we must stop seeing extensions as harmless add-ons and treat them as "full-blown software" that require a "zero trust" approach.
We discuss:
Why browser extensions should be treated with the same caution as any software.
The "zero trust" principle: if it's not essential, don't install it.
Why even small businesses are targets for automated, large-scale cyber attacks.
Key preventative measures businesses can take beyond just technology.
How to spot suspicious permission requests before you click "okay."
For business owners, IT managers, and everyday users, this is an essential guide to understanding and mitigating a commonly overlooked cybersecurity risk.
See omnystudio.com/listener for privacy information.
3 Listeners
0 Listeners
0 Listeners
7 Listeners
4 Listeners
1 Listeners
1 Listeners