Oasis includes advanced protection against deceptive content and dangerous software to keep you safe while browsing. This feature helps identify and block phishing attempts, malware, and other security threats before they can harm your device or steal your information.
What is Deceptive Content and Dangerous Software?
Deceptive content and dangerous software include various types of online threats designed to harm your device, steal your information, or trick you into taking harmful actions.
Types of Threats
- Phishing websites and emails
- Malware and viruses
- Ransomware attacks
- Fake login pages
- Scam websites
- Malicious downloads
Common Attack Methods
- Impersonating legitimate websites
- Creating fake login forms
- Distributing infected files
- Using deceptive URLs
- Social engineering tactics
- Exploiting vulnerabilities
How Protection Works
Oasis uses multiple layers of security to protect you from deceptive content and dangerous software:
Real-Time Scanning
Every website you visit is checked against databases of known malicious sites and suspicious patterns that indicate potential threats.
Download Protection
Files you download are scanned for malware and other dangerous content before they can be executed on your device.
Phishing Detection
Websites that attempt to impersonate legitimate services are identified and blocked to prevent credential theft.
Protection Features
Phishing Protection
- Identifies fake login pages
- Blocks impersonation websites
- Warns about suspicious URLs
- Detects social engineering attempts
- Protects against credential theft
Malware Protection
- Scans downloaded files
- Blocks malicious websites
- Prevents drive-by downloads
- Detects exploit attempts
- Protects against ransomware
Deceptive Content Detection
- Identifies scam websites
- Blocks fake news and misinformation
- Detects fraudulent offers
- Warns about suspicious content
- Protects against social engineering
Understanding Security Warnings
Warning Types
- Red Warning: High-risk threat detected
- Yellow Warning: Potential risk identified
- Information Alert: Security notice
- Download Warning: File safety concern
- Phishing Alert: Fake website detected
What to Do
- Read the warning message carefully
- Do not proceed if warned about danger
- Report false positives if needed
- Contact support for clarification
- Use alternative safe sources
Enabling and Configuring Protection
Follow these steps to ensure your protection is properly configured:
Check Protection Settings
Open your browser settings and navigate to Privacy & Security. Ensure that "Block dangerous and deceptive content" is enabled.
Configure Protection Levels
Choose your preferred protection level: Standard (recommended), Strict (maximum protection), or Custom (selective protection).
Set Up Exceptions
Add trusted websites to the exception list if needed, but be cautious about bypassing protection for unknown sites.
Test Your Protection
Visit known safe websites to ensure protection is working correctly and not blocking legitimate content.
Common Threat Scenarios
Phishing Attacks
- Fake banking websites
- Impersonated social media login pages
- Fake email service providers
- Counterfeit shopping sites
- Fake government websites
Malware Distribution
- Infected software downloads
- Malicious email attachments
- Compromised advertisements
- Fake update notifications
- Infected file sharing links
Deceptive Content
- Fake news websites
- Scam product offers
- Fraudulent investment schemes
- Fake technical support
- Counterfeit online stores
Best Practices for Online Safety
General Security
- Keep your browser updated
- Use strong, unique passwords
- Enable two-factor authentication
- Be cautious with email links
- Verify website URLs carefully
Safe Browsing Habits
- Don't click suspicious links
- Verify website authenticity
- Use trusted download sources
- Be skeptical of urgent requests
- Report suspicious activity
What to Do If You Encounter Threats
Stop and Assess
If you see a security warning, stop what you're doing and carefully read the warning message before proceeding.
Do Not Proceed
If the warning indicates danger, do not continue to the website or download the file. Close the tab and find an alternative safe source.
Report if Necessary
If you believe the warning is incorrect (false positive), you can report it to help improve the protection system.
Take Additional Steps
If you've already interacted with suspicious content, consider running a security scan and changing any passwords you may have entered.
Advanced Protection Settings
Custom Protection Rules
- Set specific protection levels for different sites
- Configure download scanning preferences
- Customize warning sensitivity
- Set up automatic blocking rules
- Configure exception handling
Integration Features
- Works with system security software
- Integrates with password managers
- Compatible with VPN services
- Supports security extensions
- Works across different devices
Troubleshooting
Common Issues
- Protection not working on certain sites
- False positive warnings
- Legitimate sites being blocked
- Download protection interfering
- Protection settings not saving
Solutions
- Check protection settings and permissions
- Update browser to latest version
- Clear browser cache and cookies
- Add legitimate sites to exceptions
- Report false positives for review
What to Expect
When using deceptive content and dangerous software protection, you may experience:
Security Benefits
- Protection against phishing attacks
- Malware and virus prevention
- Safe browsing experience
- Reduced risk of identity theft
- Protection against financial fraud
User Experience
- Occasional security warnings
- Some legitimate sites may be flagged
- Download scanning may take time
- Need to manage exceptions
- Regular security updates
Technical Details
Deceptive content and dangerous software protection uses advanced security technologies:
How Protection Works
- Real-Time Scanning: Continuously monitors websites and downloads for threats
- Database Matching: Compares against known malicious sites and patterns
- Behavioral Analysis: Identifies suspicious behavior and patterns
- Machine Learning: Uses AI to detect new and evolving threats
- Secure Communication: Safely transmits threat data for analysis
Since Oasis is built on Firefox core technology, deceptive content and dangerous software protection provides the same robust security capabilities with enhanced threat detection and prevention.
Need Help with Oasis Browser?
Join our Discord community to get support, ask questions, and connect with other Oasis users and the Kahana team.
Related Documentation
Connection Upgrades
Learn how Oasis automatically upgrades connections to more secure protocols, enhancing your browsing security and protecting your data during transmission.
HTTPS-Only Mode
Learn how HTTPS-Only Mode ensures secure connections to websites by only allowing encrypted HTTPS connections and prompting before insecure connections.
Password Manager - Alerts for breached websites
Learn how to receive alerts about passwords for breached websites and protect your accounts from security threats.
About the Author

I'm the CTO of Kahana, bringing a unique perspective from my management consulting experience at Clarkston Consulting and biomedical engineering background from Duke University. I'm focused on making the future of work more ergonomic through innovative technology solutions that prioritize user well-being and productivity.