November 28, 2017 By Larry Loeb 2 min read

Cybersecurity education and security awareness have been important components of security for some time, but it’s never been easy to get companies to buy into the effort. One web browser is making an effort to change that.

Cybersecurity Education Takes Center Stage

Mozilla is working to integrate the data breach service Have I Been Pwned into Firefox’s user interface (UI). According to GitHub, Mozilla aims to use the service to alert users about data breaches and provide them with a bit of cybersecurity education.

Have I Been Pwned is a widely respected site run by Australian security researcher Troy Hunt. Its integration into a browser will alert users to data breaches that have led to credential leaks, potentially preventing Firefox users from falling prey to attacks.

Users will be automatically notified when they enter a site that has been recently breached. The browser will also offer a “Learn more” link when alerting users so that they can access additional information about data breaches within the Firefox UI. Those who are interested can then choose to join a service that will notify them about when they might be affected by future breaches, the information on GitHub explained.

Maintaining Data Security

According to Infosecurity Magazine, Hunt expressed some concerns about preserving data security during the process. “What I can say for sure is that no passwords will be involved here — I don’t store them nor do I provide any means of querying them, and I won’t be providing them to anyone else either,” he noted.

Mozilla is sensitive to these privacy issues. The company is working to determine who the custodian of this data will be and how it can offer functionality to users who opt out of subscribing to notifications. As noted by InfoSecurity Magazine, “While the project is still in infancy, the idea is to offer as much utility as possible while respecting the user’s privacy.”

It remains to be seen if Have I Been Pwned will make a big difference for Firefox users, but it’s a step in the right direction for a more secure future.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today