This document discusses browser attacks and provides recommendations for protecting against them. It notes that browser exploits can occur when there are weaknesses in the browser or low security settings that allow cyber criminals to install malware. Examples given include ActiveX scripts installing without permission and tricking users into downloading hijackers. The document recommends users never disable their firewall, accept unknown files, or disable browser security settings. It also advises consulting the IT department for any system issues or uninstallation of toolbars and plugins.