Navigation and service

Browsers

A popular target for attacks

Internet browsers are the central component for using online services and therefore constitute one of the most popular targets for cyber attacks. Hence, the corresponding threat potential is particularly high. Because although a browser can display the information provided by a news website on your computer, for example, it can also be the portal through which malware gets into your system or data is stolen.

What criteria should I use to choose the right browser for me?

There is no one-size-fits-all answer to the question of how to choose the right browser. Every product has its own individual security and operating features. So it is worth taking a moment to look at their different characteristics. The threats and risks faced by browsers are constantly changing. Manufacturers therefore have to keep their security safeguards under ongoing review and adapt them to new challenges. But users shoulder a large part of the responsibility too.

Watch this animated explainer video to find out how to make your browser secure for all your devices:

People use devices in different ways, and individual settings must be made and precautions taken for each different style. Knowing what threats are out there is the first indispensable step to improving your personal online safety. Only if a browser meets the security criteria covered below can you move on to considering their other features such as handling or design.

What do I want to do with my browser?

Ask yourself what you want to do with your browser and whether the program will continue to meet your needs in future. Even if you only surf the Internet, your browser still has high requirements to meet. After all, if your computer is subjected to an attack through vulnerabilities in the program, substantial damage can result. If you also handle sensitive data like banking information via a web browser, then these requirements are especially high.

The further sections listed below will therefore tell you all about what threats may be lurking online, but also how you can configure your browser securely so as to minimise the particular risks that you face. If you are not sure whether you have configured your browser appropriately to deal with the challenges of the Internet, you can look up the specific recommendations for your program in 'Configuring a browser securely'.

Who is behind your browser?

When it comes to the web browser market, there are two basic approaches to program development. On the one hand, you have browsers such as Internet Explorer (IE), which are based on closed source software. Companies that write their own software and do not allow others to view its structure or code are behind this type of program. On the other hand, there are browsers like Firefox, which is practically 100% open source. This means the program code is made public, so other companies and programmers are able to view it.

The advantage of this is that errors can be discovered and rectified faster than with the closed source approach. Browsers such as Chrome or Safari combine both these strategies: they are built on open source technology, but keep large parts of their source code under wraps.

If you want to avoid certain companies or support a specific one of the approaches outlined here, you can find out which organisations are involved in running the browser you have in mind before you start using it.

Our tips on how to make your browser more secure

Die Infografik zeigt ein Browser-Fenster. In der Browserzeile steht neben einem Schloss der Titel "Sicherheitscheck für Ihren Web-Browser". Im Browserfenster werden statt einer Webseite fünf Icons angezeigt mit den fünf Hinweisen. Infografik Sicherheitscheck für Ihren Web-Browser
Infografik Sicherheitscheck für Ihren Web-Browser Source: Bundesamt für Sicherheit in der Informationstechnik

Today's browsers offer a wide range of functions and fulfil an incredibly responsible role. And that is exactly why criminals target them. If a hacker obtains full access to your web browser, they can eavesdrop on or manipulate all your communications. Attacks on browsers are therefore extremely lucrative for perpetrators and just as unpleasant for victims.