uBlocked: As Chrome Transitions to Manifest V3, Ad Blockers Get Less Effective

Users of uBlock Origin have started seeing a warning in Google Chrome that the popular extension may not be supported by the browser.
The post uBlocked: As Chrome Transitions to Manifest V3, Ad Blockers Get Less Effective appeared first on Thurrott.com.
Continue reading uBlocked: As Chrome Transitions to Manifest V3, Ad Blockers Get Less Effective

Online testing firm agrees to security audit after inquiry from senator

A company whose software has been widely used to administer law school entrance exams during the coronavirus pandemic has agreed to an independent audit of the software after a U.S. senator raised cybersecurity concerns about the product. Alabama-based ProctorU’s web-browser extension software has allowed people across the U.S. to take the LSAT exam from home during the pandemic. But Sen. Ron Wyden, D-Ore., worried that that same accessibility, if left unsecured, could give cybercriminals a foothold onto test-takers’ devices. And so, after inquiries from Wyden, ProctorU has hired outside security experts to review its software and the tool it uses for remote troubleshooting, according to the Law School Admissions Council (LSAC), which administers the LSAT. More than 145,000 LSAT exams were administered online from May 2020 to February 2021, and ProctorU appears to be the main contractor for doing so. It’s another case of privacy and security risks emerging in […]

The post Online testing firm agrees to security audit after inquiry from senator appeared first on CyberScoop.

Continue reading Online testing firm agrees to security audit after inquiry from senator

3M Users Targeted by Malicious Facebook, Insta Browser Add-Ons

Researchers identify malware existing in popular add-ons for Facebook, Vimeo, Instagram and others that are commonly used in browsers from Google and Microsoft. Continue reading 3M Users Targeted by Malicious Facebook, Insta Browser Add-Ons

How hackers used malicious Chrome extensions in a mass spying campaign

A sweeping set of surveillance campaigns has hit Google Chrome users, leading to nearly 33 million downloads of malicious software in the last three months, researchers at California-based Awake Security said Thursday. The researchers believe the unidentified hackers used Chrome extensions and other malicious tools — along with domains issued by a single registrar — to spy on computer users in sectors such as oil and gas, finance and health care. The hackers “were very effective in reaching a large number of industries and subverting controls that were in place,” said Gary Golomb, Awake Security’s cofounder and chief scientist. U.S. government contractors were among those targeted, Golomb said. He declined to identify the victims. The discovery exposes another gap in web browser security despite pledges from Google and other vendors to proactively block malicious code from appearing in their official download stores. After being tipped off by Golomb’s team, Google removed […]

The post How hackers used malicious Chrome extensions in a mass spying campaign appeared first on CyberScoop.

Continue reading How hackers used malicious Chrome extensions in a mass spying campaign

Google fights spammy extensions with new Chrome Web Store policy

The policies are specifically meant to fight spam, but they outlaw tactics taken by malicious extensions as well, including fake reviews. Continue reading Google fights spammy extensions with new Chrome Web Store policy

49 malicious Chrome extensions caught pickpocketing crypto wallets

They were posing as crypto wallets in order to rip off users’ private keys and mnemonic phrases and drain real wallets. Google’s yanked them. Continue reading 49 malicious Chrome extensions caught pickpocketing crypto wallets

Google throws bug bounty bucks at mega-popular third-party apps

If an app has more than 100 million installs, Google will pay for bugs, even if the app makers already have their own bounty programs. Continue reading Google throws bug bounty bucks at mega-popular third-party apps