Users that used JavaScript blocking in Tor browsers were not vulnerable and protected against the new Firefox zero-day.
Whenever you use Tor browser update to version https://blog.torproject.org/new-release-tor-browser-852
that has been patched against this zero-day leakage.
Opera always had the right solution as where you could enable/disable javascript per site and in an easy manner.
The best ways of blocking JavaScript inside browsers is NoScript for Tor (firefox-Tor) and uMatrix for other browsers.
Block all javascript (certainly all 3rd party javascript) and allow the primary scripts as needed to let the website function normally.
Toggling NoScript and uMatrix does not need rocket-science insights, any power user and browser savvy person can learn this.
It is a great way of protection inside the browser and works flawlessly against old, present and new JavaScript threats in the browser,
even those that we do not know of as yet and will come to pester us in the future.
It is a pity that alerted website lists differ, Bitdefender’s, DrWeb’s and avast’s all are complementary.
And some nasty adware, like Admob from Amazon is only flagged by DrWeb’s like the other av solutions ignore.
Info credits go to luntrus on Security dot nl.
Polonus of course works the Suspicious Site Reporter extension in the browser to add questionable sites to Google Safebrowsing Repositories, so helping the user community to be better protected against such sites to shun.
This apart from my reporting in the virus and worms and the constant linting and providing recommendations to come to a more secure website landscape, helping towards implementing best policies, better settings, configuration and retiring vulnerable jQuery script
and javascript errors as such. We finally must fiond a way together to steer away from the utterly insecure Swiss cheese infrastructure we now so often meet on the Interwebz.
So keep those Javascript vizors down, folks
polonus