Additional information (br)

Browser extensions

Browser extensions enhance the possibilities of your webbrowser, but they are much more dangerous than most people realize. These small tools often have access to everything you do online, so they can capture your passwords, track your web browsing, insert advertisements into web pages you visit and more. Popular browser extensions are often sold to shady companies or hijacked, and automatic updates can turn them into malware. Be extremely careful when using them and only install a browser-extension if you are really sure that it's safe.

Browser hijacking

Browser hijacking is a form of hacking in which malicious software changes a user's browser settings without their knowledge or permission, it can then take over browser-sessions, redirect to malicious websites, grab your sensitive online data like passwords or financial details, introduce malicious programs and/or add bookmarks or show advertisement-popups.
They can go unnoticed while you install software that appears to be safe, such as browser toolbars or add-ons. Another common tactic is when attackers try to trick you into allowing additional downloads when you accept a site's terms and conditions. Attackers can also trick you into installing malware that will further create more problems, and you end up with a severely damaged PC.
Many antivirus programs will search for and remove browser hijackers. Check with the developers of the antivirus app you use to find out if the antivirus supports the removal of browser hijackers.

Brute force attack

A brute force attack is a category of attack that rapidly performs the same actions millions of times to guess passwords, discover hidden URLs, or expose encrypted or hashed data.
Brute force attacks mostly are carried out in an automated fashion. Types of brute force attacks are Manual Credential Stuffing, Data-Breach Informed Credential Stuffing, Automated Credential Stuffing, URL Discovery and Cryptographic Decryption.
Protection against brute-force attacks can exist of login restrictions (like number of times per minute), salt and key-stretching.
 

Footnotes: