browser exploits

Browser Exploits: How to Prevent Extension Vulnerabilities