Malicious extensions in the Chrome Web Store
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
116 articles
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
How scammers can hack your YouTube channel without knowing a password and second factor.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.
Alternatives to Google Chrome that take data privacy more seriously.
Why you should update to the latest version of Google Chrome, Microsoft Edge, Opera, Yandex Browser, Vivaldi, Brave and other Chromium-based browsers.
Vulnerabilities found in the Exynos chipset allow Samsung, Vivo and Google smartphones to be remotely hacked if the owner’s phone number is known. How is this possible, and how to protect yourself?
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
The recent Google Chrome update patches 10 high severity vulnerabilities and a dozen of less critical bugs. Time to update your browser!
How to update Google Chrome right when you really need to, and what to do if you run into problems.
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
A vulnerability in Google Chrome has already been exploited by malefactors. All users need to update to version 89.0.4389.90.
Hackers are actively exploiting a dangerous vulnerability in Google Chrome. With Chrome 88.0.4324.150, Google has patched the vulnerability.
Is your child not yet 13 years old? We explain how to create a Google child account for him or her.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
According to recent news, quantum supremacy is reached. What should we do about it?
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.