The tools of your browser cannot see what extensions are really doing, and computer pirates know it perfectly well




  • Tags as “verified” give a false sense of security, but do not reflect the real extension behavior
  • The Devtools browser never intended to track how extensions behave through the tabs and over time
  • Malicious extensions often act normally until specific triggers make their hidden characteristics come alive

The propagation without control of malicious browser extensions continues to expose users to Spyware and other threats, largely due to deep failures in the way in which the software manages the security of the extension.

A new Squarex research states that many people still depend on superficial trusted markers such as “verified” or “highlighted chrome”, which have not been able to prevent a generalized commitment.

Leave a Comment

Your email address will not be published. Required fields are marked *