Tag: Internet Security

  • How Maxthon Could Help With Online Gaming Security?

    How Maxthon Could Help With Online Gaming Security?

      Browser management and the safe environment. Browsing security measures. How to choose the right websites to visit.   The evolution of the internet has taken everyone by surprise, it brings us all vast amounts of enjoyment and engagement, from shopping, social media, online maps, to streaming video. However, in the last ten or twelve…

  • Safety When Using Bitcoin for Online Purchases

    Safety When Using Bitcoin for Online Purchases

    The crypto-currency known as Bitcoin (BTC) is growing increasingly popular for users to conduct their online trades. For those still unsure what Bitcoins are, they are a form of digital currency that can be instantly transferred to anyone in the world and at no point come into effect offline. In short, they are web only…

  • Best Way To Deal With Online Security is By Using Your Common Sense

    Best Way To Deal With Online Security is By Using Your Common Sense

    According to CNN, every day there is a new threat popping up in the online world. It is nearly impossible to keep up with every threat. There are many different types of software out there, all promising you to keep your devices safe, however, we have a large part to play in ensuring our online…

  • Incognito Mode: Making Your Browsing Private By Using Maxthon Cloud Browser

    Incognito Mode: Making Your Browsing Private By Using Maxthon Cloud Browser

    After Congress passed bill allowing ISP (Internet Service Providers) to sell customers’ web surfing data, people started to draw more attention on their browsing privacy. Now that we could neither change the passed bill, nor turn the tables by buying Congress’ web history and publishing them for all (it has been proved officially. :P), the…

  • Maxthon, The Most Secure Browser On The Web Without Viruses and Malware

    Maxthon, The Most Secure Browser On The Web Without Viruses and Malware

    Nowadays, most of us rely more and more on the computer and the internet, which brings us the concept of cyberspace. However, as the main roles in this cyberspace, though not a living thing like you and me, computers can get “sick” from viruses, too. In this post, we will give a brief introduction about…

  • Maxthon SHA-1 Certificates Deprecation Plan

    Maxthon SHA-1 Certificates Deprecation Plan

    Secure Hash Algorithm (SHA) is published by National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), while SHA-1 is one hash function of SHA family, which is widely used by Certification Authorities (CAs) and Web site administrators for their SSL certificates. However, in 2005, cryptanalysts found collision attacks on…

  • Security and Privacy are Top Priorities at Maxthon

    Security and Privacy are Top Priorities at Maxthon

    This week Exatel published a report saying that Maxthon collects sensitive user information and sends the URLs to the Maxthon server. We take the allegations from the Exatel report very seriously and have fully investigated this matter. User Experience Improvement Program (UEIP) Maxthon implements a User Experience Improvement Program (UEIP), a standard industry practice to…

  • How safe are you while browsing the Internet? Maxthon’s got you covered!

    How safe are you while browsing the Internet? Maxthon’s got you covered!

      The Internet can be a dangerous place. One of Maxthon’s biggest goals is to provide users with safe and secure Internet browsing that won’t be compromised by hackers or third-party advertisers. We take several measures on our end to make sure your computer and your web history remains safe. Here are just a few steps you can take when it…

  • Users Beware: Even Homeland Security Says Not to Use Internet Explorer

    Users Beware: Even Homeland Security Says Not to Use Internet Explorer

    How scary is the latest Internet Explorer security vulnerability? Even the U.S. government says not to use IE until the browser is fixed. The flaw, which affects Internet Explorer versions 6 and up, allows bad guys to gain complete access to a PC via a malicious website. Dubbed “Operation Clandestine Fox” by the security firm FireEye,…

  • Maxthon’s 3-Step Approach to Better Security

    Maxthon’s 3-Step Approach to Better Security

    Maxthon’s 3-Step Approach to Better Security At Maxthon, security and privacy aren’t terms to be thrown around, they are a promise. We have the arsenal of security systems and processes to keep you and your data safe as you freely enjoy your web the way you want it, when you want it, wherever you want…