If you're running a load of Chrome extensions, you may want to pay attention to a research study set to be presented at the Usenix Security Symposium in San Diego tomorrow. As PC World reports, researchers at the University of California at Berkeley discovered that many extensions engage in "a variety of affiliate fraud, credential theft, advertising fraud and social network abuse." These extensions don't behave badly right after being installed; instead, illicit activity is triggered by specific kinds of web content.
The study examined 48,000 Chrome extensions and found 130 to be "outright malicious." 4,712 extensions were classified as suspicious, but the PC World story doesn't call out any of the offenders by name. It does, however, note that millions of folks have downloaded some of the questionable extensions. More details will presumably be released during tomorrow's presentation.
Google worked with the researchers during the study, and it's already taking action based on the findings. The firm has reportedly made it more difficult to "sideload" applications that aren't available via the official Chrome Web Store. Extensions offered through the Web Store should be thoroughly vetted, and Google will presumably be paying closer attention to the behaviors uncovered by the study. Affiliate fraud is apparently being addressed with changes to Google's extension policies.
|Report: Comcast will abandon Time Warner acquisition||50|
|Friday Night Shortbread||4|
|Acer's Switch 10 is a svelte, Atom-powered convertible||10|
|Hardware makers want to standardize the stylus||32|
|Deal of the week: The M500 960GB for $290, Battlefield Hardline for $36, and lots more||11|
|Thermaltake's Pacific radiators come in all the sizes||8|
|Modders can now charge for their work on Steam Workshop||195|
|Samsung's new 840 EVO fix starts trickling out||22|
|Arkham Knight requires at least 2GB of graphics memory||111|