![]() ![]() Even in managed environments, users are often able to install extensions or ‘Add Ons’ without authorisation when these are sourced from trusted sources like Apple’s Safari Extensions Gallery and Google’s Chrome store. Search redirection is a favorite trick of adware extensions, as we found out in this analysis of an extension hosted in both Google’s Chrome Store and Apple’s Safari Gallery*.īrowser extensions are a staple of almost every user’s set up. As news hit last week of a zero-day remote code execution (RCE) vulnerability in Google Chrome that only requires a user to land on or be redirected to a malicious website, we take a look at the threat posed by browser extensions. ![]()
0 Comments
Leave a Reply. |