	{"id":51547,"date":"2016-03-29T09:46:28","date_gmt":"2016-03-29T16:46:28","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=51547"},"modified":"2016-03-29T09:46:28","modified_gmt":"2016-03-29T16:46:28","slug":"how-to-use-your-web-browsers-fraudulent-site-protection-feature","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/","title":{"rendered":"How to Use Your Web Browser&#8217;s Fraudulent Site Protection Feature"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-52018\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Browser-Fraudulent-Website-Protection.jpg\" alt=\"Web Browser Fraudulent Site Protection\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Browser-Fraudulent-Website-Protection.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Browser-Fraudulent-Website-Protection-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Browser-Fraudulent-Website-Protection-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Malware comes in many types, and it threatens you in many ways. In the early days of computers, the main worry was that you&#8217;d get infected by viruses that hid on floppy disks. That medium is no longer a threat, and most malware now is downloaded from the internet or attached to email messages. You can usually tell from the email you get whether an attachment is suspicious; lately, a lot of phishing email contain subjects such as &#8220;Invoice&#8221; or &#8220;Photo,&#8221; in the hopes that you might absent-mindedly double-click on a file. But some well-crafted emails may fool you.<\/p>\n<p>Even if you are careful to not open files you receive with emails, and don&#8217;t download files from unreliable websites, there are still risks. <em>Drive-by downloads<\/em> can infect you unwittingly when you visit a website; the code on a page causes a file to be downloaded, and, in some cases, depending on your settings, that file may be launched automatically.<\/p>\n<p>Other malicious websites may attempt to take advantage of <em>vulnerabilities<\/em> in software such as your web browser, or in the plug-ins it uses. One of the most attacked pieces of software is Adobe&#8217;s Flash Player. This plug-in is regularly updated as vulnerabilities seem to spring up like mushrooms after a thunderstorm. (See <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/adobe\/\" target=\"_blank\">these articles<\/a> on the Intego Mac Security Blog to see how often Adobe updates Flash.)<\/p>\n<p>Because of this, web browsers have adopted &#8220;fraudulent site protection,&#8221; which relies on a constantly-updated database of URLs that lead to malware. Google&#8217;s <a href=\"https:\/\/developers.google.com\/safe-browsing\/\" target=\"_blank\">Safe Browsing service<\/a> is the most widely used such database; Safari, Firefox, and Chrome all use this on the desktop, and Safari uses it on iOS devices. Google says, about the Safe Browsing service, that it can:<\/p>\n<blockquote>\n<ul>\n<li>Warn users before they click on links in your site that may lead to malware-infected pages.<\/li>\n<li>Check a list of pages against Google&#8217;s lists of suspected phishing, malware, and unwanted software pages.<\/li>\n<\/ul>\n<\/blockquote>\n<p><a href=\"https:\/\/www.google.com\/transparencyreport\/safebrowsing\/\" target=\"_blank\">According to Google<\/a>, some one-billion people use Google Safe Browsing, and tens of millions of people receive alerts every week about unsafe websites. They detect thousands of new malicious websites every day, and add them to the database. When you load a web page in your browser, the browser checks the URL against the database. If a fraudulent site is detected, the browser alerts you.<\/p>\n<p>Google detects two types of sites: those that serve malware, and those that serve as phishing hooks. These latter sites may resemble, say, an Apple or Amazon website, or even a bank&#8217;s website, in an attempt to trick you into entering your user name and password. If you do so, this data will be harvested and potentially used to empty your account, access your personal data, and more.<\/p>\n<p>There are two ways that sites can be fraudulent. The first is websites that are set up intentionally to serve malware, or to trick people into entering personal information. The second is compromised websites. These are legitimate sites where hackers have installed a few pages, deep in the directory structure, where the people who manage the sites may never notice them. For the latter, Google attempts to contact webmasters to warn them that their sites have been compromised; because, in most cases, someone who runs a small blog may never know they&#8217;ve been hacked.<\/p>\n<h3>Activating Fraudulent Site Protection<\/h3>\n<p>As I said above, the three major web browsers \u2014 Safari, Firefox, and Chrome \u2014 all offer fraudulent site protection. Let&#8217;s look at how you turn this on for desktop versions of these browsers.<\/p>\n<h4><strong>Safari<\/strong><\/h4>\n<p>To activate fraudulent site protection in Safari: Choose <strong>Safari<\/strong> &gt; <strong>Preferences<\/strong>, and then click <strong>Security<\/strong>. Check the box,\u00a0&#8220;Fraudulent Sites: Warn when visiting a fraudulent website.&#8221;<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-fraudulent-site-protection.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-51568\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-fraudulent-site-protection-1024x346.png\" alt=\"safari-fraudulent-site-protection\" width=\"500\" height=\"169\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-fraudulent-site-protection-1024x346.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-fraudulent-site-protection-150x51.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-fraudulent-site-protection-300x101.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-fraudulent-site-protection-657x222.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-fraudulent-site-protection.png 1496w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<h4><strong>Firefox<\/strong><\/h4>\n<p>To activate\u00a0fraudulent site protection in Firefox: Choose <strong>Firefox<\/strong> &gt; <strong>Preferences<\/strong>, and then click <strong>Security<\/strong>. Check the boxes for &#8220;Block reported attack sites&#8221; and &#8220;Block reported web forgeries.&#8221; (It&#8217;s a shame that Firefox uses such odd language; the terms &#8220;fraudulent websites&#8221; and &#8220;phishing&#8221; are common enough that they should be standard.)<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/firefox-fraudulent-site-protection.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-51562\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/firefox-fraudulent-site-protection.png\" alt=\"firefox-fraudulent-site-protection\" width=\"500\" height=\"362\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/firefox-fraudulent-site-protection.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/firefox-fraudulent-site-protection-150x109.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/firefox-fraudulent-site-protection-300x217.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<h4><strong>Google Chrome<\/strong><\/h4>\n<p>To activate fraudulent site protection in Google Chrome: Choose <strong>Chrome<\/strong> &gt; <strong>Preferences<\/strong>, and then click <strong>Show Advanced Settings<\/strong> at the bottom of the page. In the Privacy section, check the box, &#8220;Protect you and your device from dangerous sites.&#8221;<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/chrome-fraudulent-site-protection.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-51565\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/chrome-fraudulent-site-protection-1024x668.png\" alt=\"chrome-fraudulent-site-protection\" width=\"500\" height=\"326\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/chrome-fraudulent-site-protection-1024x668.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/chrome-fraudulent-site-protection-150x98.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/chrome-fraudulent-site-protection-300x196.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/chrome-fraudulent-site-protection-305x200.png 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/chrome-fraudulent-site-protection-400x260.png 400w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/chrome-fraudulent-site-protection-657x429.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/chrome-fraudulent-site-protection.png 1295w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>If you do encounter a dangerous website, you&#8217;ll see an alert, and you&#8217;ll be able to act accordingly. While there are rare cases of false positives \u2014 websites flagged as fraudulent which are, indeed, safe \u2014 you should assume that when you see such an alert it&#8217;s best not to venture any further. Just close the window or tab and move on.<\/p>\n<p>Here&#8217;s Safari&#8217;s alert for a suspected phishing site:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-safari.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-51556\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-safari-1024x577.png\" alt=\"alert-safari\" width=\"500\" height=\"282\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-safari-1024x577.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-safari-150x85.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-safari-300x169.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-safari-657x370.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-safari.png 1068w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>And here&#8217;s an alert in Google Chrome; it&#8217;s hard to miss:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-chrome.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-51559\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-chrome-1024x602.png\" alt=\"alert-chrome\" width=\"500\" height=\"294\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-chrome-1024x602.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-chrome-150x88.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-chrome-300x176.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-chrome-657x386.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/alert-chrome.png 1358w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<h3>Fraudulent Site Protection on iOS<\/h3>\n<p>Safari on iOS can also use Google&#8217;s Safe Browsing service. You can activate it in <strong>Settings<\/strong> &gt; <strong>Safari<\/strong>. Scroll down to the Privacy &amp; Security section, and toggle Fraudulent Website Warning.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-fraudulent-site-protection.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-51553\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-fraudulent-site-protection.png\" alt=\"safari-ios-fraudulent-site-protection\" width=\"500\" height=\"310\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-fraudulent-site-protection.png 754w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-fraudulent-site-protection-150x93.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-fraudulent-site-protection-300x186.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-fraudulent-site-protection-657x408.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>If you encounter a fraudulent page in Safari on iOS, you see a warning as seen in the\u00a0image below; the red bar at the top of the screen is a good way to alert you that something is wrong.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-alert.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-51550\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-alert-576x1024.png\" alt=\"safari-ios-alert\" width=\"500\" height=\"888\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-alert-576x1024.png 576w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-alert-84x150.png 84w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-alert-169x300.png 169w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-alert-657x1167.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/safari-ios-alert.png 752w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Fraudulent site protection is a valuable feature, but it&#8217;s not foolproof. It depends on dangerous sites being reported to Google, and, while this happens quickly, new sites may spring up and threaten you before Google&#8217;s database is updated. So you should still always be careful where you surf. But using this feature can help warn you about many of the dangers you face when using the web.<\/p>\n<p><strong>Further Reading:\u00a0<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/phishing-dangers-in-business-and-how-to-avoid-getting-hooked\/\" target=\"_blank\">Phishing Dangers in Business and How to Avoid Getting Hooked<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-web-browser-comparison\/\" target=\"_blank\">Seven iOS Web Browsers Compared<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/social-hacking\/\" target=\"_blank\">The 6 Most Common Social Hacking Exploit Techniques<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Web browsers have adopted &#8220;fraudulent site protection&#8221; to protect you from suspected phishing sites. Here&#8217;s how to activate your browser&#8217;s fraudulent site protection feature.<\/p>\n","protected":false},"author":46,"featured_media":52024,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,13],"tags":[2830,102,1750,319,2086],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Web browsers have adopted &quot;fraudulent site protection&quot; to protect you from suspected phishing sites. Here&#039;s how to activate your browser&#039;s fraudulent site protection feature.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Use Your Web Browser&#039;s Fraudulent Site Protection Feature - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Web browsers have adopted &quot;fraudulent site protection&quot; to protect you from suspected phishing sites. Here&#039;s how to activate your browser&#039;s fraudulent site protection feature.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-29T16:46:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/phishing-site-protection.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/phishing-site-protection.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/phishing-site-protection.jpg\",\"width\":400,\"height\":260,\"caption\":\"Phishing Site Protection\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/\",\"name\":\"How to Use Your Web Browser's Fraudulent Site Protection Feature - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#primaryimage\"},\"datePublished\":\"2016-03-29T16:46:28+00:00\",\"dateModified\":\"2016-03-29T16:46:28+00:00\",\"description\":\"Web browsers have adopted \\\"fraudulent site protection\\\" to protect you from suspected phishing sites. Here's how to activate your browser's fraudulent site protection feature.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Use Your Web Browser&#8217;s Fraudulent Site Protection Feature\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"How to Use Your Web Browser&#8217;s Fraudulent Site Protection Feature\",\"datePublished\":\"2016-03-29T16:46:28+00:00\",\"dateModified\":\"2016-03-29T16:46:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#webpage\"},\"wordCount\":957,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/phishing-site-protection.jpg\",\"keywords\":[\"Fraudulent Site Protection\",\"Phishing\",\"Safe Browsing\",\"Security\",\"Web Browsers\"],\"articleSection\":[\"How To\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Web browsers have adopted \"fraudulent site protection\" to protect you from suspected phishing sites. Here's how to activate your browser's fraudulent site protection feature.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/","og_locale":"en_US","og_type":"article","og_title":"How to Use Your Web Browser's Fraudulent Site Protection Feature - The Mac Security Blog","og_description":"Web browsers have adopted \"fraudulent site protection\" to protect you from suspected phishing sites. Here's how to activate your browser's fraudulent site protection feature.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-03-29T16:46:28+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/phishing-site-protection.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/phishing-site-protection.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/phishing-site-protection.jpg","width":400,"height":260,"caption":"Phishing Site Protection"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/","name":"How to Use Your Web Browser's Fraudulent Site Protection Feature - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#primaryimage"},"datePublished":"2016-03-29T16:46:28+00:00","dateModified":"2016-03-29T16:46:28+00:00","description":"Web browsers have adopted \"fraudulent site protection\" to protect you from suspected phishing sites. Here's how to activate your browser's fraudulent site protection feature.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How to Use Your Web Browser&#8217;s Fraudulent Site Protection Feature"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"How to Use Your Web Browser&#8217;s Fraudulent Site Protection Feature","datePublished":"2016-03-29T16:46:28+00:00","dateModified":"2016-03-29T16:46:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#webpage"},"wordCount":957,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/phishing-site-protection.jpg","keywords":["Fraudulent Site Protection","Phishing","Safe Browsing","Security","Web Browsers"],"articleSection":["How To","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-use-your-web-browsers-fraudulent-site-protection-feature\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/phishing-site-protection.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-dpp","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51547"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=51547"}],"version-history":[{"count":25,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51547\/revisions"}],"predecessor-version":[{"id":52045,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51547\/revisions\/52045"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/52024"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=51547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=51547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=51547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}