If you're running a load of Chrome extensions, you may want to pay attention to a research study set to be presented at the Usenix Security Symposium in San Diego tomorrow. As PC World reports, researchers at the University of California at Berkeley discovered that many extensions engage in "a variety of affiliate fraud, credential theft, advertising fraud and social network abuse." These extensions don't behave badly right after being installed; instead, illicit activity is triggered by specific kinds of web content.
The study examined 48,000 Chrome extensions and found 130 to be "outright malicious." 4,712 extensions were classified as suspicious, but the PC World story doesn't call out any of the offenders by name. It does, however, note that millions of folks have downloaded some of the questionable extensions. More details will presumably be released during tomorrow's presentation.
Google worked with the researchers during the study, and it's already taking action based on the findings. The firm has reportedly made it more difficult to "sideload" applications that aren't available via the official Chrome Web Store. Extensions offered through the Web Store should be thoroughly vetted, and Google will presumably be paying closer attention to the behaviors uncovered by the study. Affiliate fraud is apparently being addressed with changes to Google's extension policies.
|MSI lets loose a trio of Optane motherboard bundles||11|
|Biostar shows up fashionably late to the Radeon 500-series party||4|
|GeForce 381.89 drivers power up their armor for Dawn of War III||7|
|National DNA Day Shortbread||22|
|Asus Vivo PC X is slim and ready for a VR headset||4|
|Nvidia teams with Oculus for a VR game bundle||2|
|SK Hynix fires up its foundries for 16 Gb/s GDDR6||31|
|Corsair's K95 RGB Platinum gaming keyboard reviewed||7|
|EK shows its first waterblock for an AMD Ryzen mobo||10|