With all of this sophisticated hacking in the mix, end users will have to get more educated on how to maintain their systems. The irony is that this message is intended as a phishing attempt and does not constitute a legitimate cybersecurity alert. Many PC users have heard a warning voice suddenly screech out of their laptop or desktop computer talking about how they could harm files or destroy systems if they don't do certain immediate tasks. It's a little like another major hack making its way around the consumer community now. The issue lies in what happens behind the scenes, and how hackers clone, imitate and hijack legitimate systems, names and techniques to befuddle their targets. An ad blocker or anti-malware program seems like it's intended to enhance security, not detract from it. Part of the deceptive nature of these new types of hacking is that hackers prey on the idea that users have to safeguard their systems. Extensions are distributed through the Chrome developer dashboard and they are published to the Chrome Web store – but some are saying that without more involved screening for these third-party products, more end users could see their systems jeopardized. But people are still talking about how lackluster vetting can produce additional dangers for customers.Īt issue is the Google Chrome extension – a type of small software program that users can add to Google Chrome to enhance how the browser works. ZDNet provided a breakdown where one product, AdRemover for Google Chrome, was utilized by over 10 million users, with another variety, uBlock Plus, garnering 8 million users and a fake AdBlock Pro getting more than 2 million users.Īfter cybersecurity experts discovered malicious features in the cloned ad blockers, Google decided to remove many of the worst offenders. The tech press widely reported that over 20 million users had installed some form of one of these fake ad blockers before Google decided to yank them from the inventory. The recent rash of malicious ad blockers dropped from Google's Chrome Store shows how difficult it is to shield end users from deceptive types of hacking.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |