If you're running a load of Chrome extensions, you may want to pay attention to a research study set to be presented at the Usenix Security Symposium in San Diego tomorrow. As PC World reports, researchers at the University of California at Berkeley discovered that many extensions engage in "a variety of affiliate fraud, credential theft, advertising fraud and social network abuse." These extensions don't behave badly right after being installed; instead, illicit activity is triggered by specific kinds of web content.
The study examined 48,000 Chrome extensions and found 130 to be "outright malicious." 4,712 extensions were classified as suspicious, but the PC World story doesn't call out any of the offenders by name. It does, however, note that millions of folks have downloaded some of the questionable extensions. More details will presumably be released during tomorrow's presentation.
Google worked with the researchers during the study, and it's already taking action based on the findings. The firm has reportedly made it more difficult to "sideload" applications that aren't available via the official Chrome Web Store. Extensions offered through the Web Store should be thoroughly vetted, and Google will presumably be paying closer attention to the behaviors uncovered by the study. Affiliate fraud is apparently being addressed with changes to Google's extension policies.
|Kopin microdisplays could make VR headsets sharper and slimmer||5|
|Rumor: Ryzen stock coolers and retail packaging pictured||35|
|International Mother Language Day Shortbread||13|
|AOC readies up a pair of 144-Hz curved VA monitors||15|
|Fallout 4's wasteland is coming to VR||10|
|Blizzard ends support for Windows XP and Vista||33|
|TSUBAME3.0 gears up for AI supercomputing with 2160 Tesla P100s||45|
|Master of Shapes brings Vive tracking to Daydream VR||5|
|Biostar's Ryzen motherboards race toward release||67|
|"You must create an account and be logged in to GeForce Experience to attend this event."||+59|