browser extension
- Information Technology > Security & Privacy (1.00)
- Leisure & Entertainment > Games > Computer Games (0.74)
Browser extension malware infected 8.8M users in DarkSpectre attack
This material may not be published, broadcast, rewritten, or redistributed. Quotes displayed in real-time or delayed by at least 15 minutes. Market data provided by Factset . Powered and implemented by FactSet Digital Solutions . Mutual Fund and ETF data provided by Refinitiv Lipper . Retired FBI agent explains how the real-life'Sopranos' were dismantled from the inside Concerns remain over AI's impact on young people amid boom Tech expert praises New York's school cellphone ban as social media concerns rise Trump advisor details administration's push to boost AI hiring Kash Patel to close FBI's Hoover building in DC permanently Santa is'PACKING HEAT' during a traffic stop Trump has made AI a'key part' of his agenda, expert says Kurt'CyberGuy' Knutsson joins'Fox & Friends' to discuss grocery stores collecting biometric data, including facial recognition and eye scans, as Wegmans confirms limited use in higher-risk locations.
- North America > United States > New York (0.24)
- North America > United States > Virginia (0.04)
- North America > United States > Minnesota (0.04)
- Europe > Ukraine (0.04)
This Chrome Extension Turns LinkedIn Posts About AI Into Facts About Allen Iverson
The developers of a browser tool that changes AI-centric LinkedIn posts to Allen Iverson facts want to help "take back control of your experience of the internet." Give yourself a nice gift this holiday season. Download a free Chrome extension that replaces those incessant LinkedIn posts about artificial intelligence with facts about a very different kind of AI: Allen Iverson. Yes, the answer to your generative AI woes is "The Answer," the crossover king, the four-time NBA scoring champ. One of the defining traits of LinkedIn has always been unhinged posts from power users--the r/LinkedInLunatics subreddit exists for a reason--but the obsessive tenor of LinkedIn posting has become, somehow, more unbearable over the past few years as the generative AI hype cycle has grown.
- North America > United States > Virginia (0.05)
- North America > United States > California (0.05)
- Europe > Slovakia (0.05)
- Europe > Czechia (0.05)
- Information Technology > Services (0.91)
- Information Technology > Security & Privacy (0.70)
ExaCraft: Dynamic Learning Context Adaptation for Personalized Educational Examples
Chatterjee, Akaash, Kundu, Suman
Learning is most effective when it's connected to relevant, relatable examples that resonate with learners on a personal level. However, existing educational AI tools don't focus on generating examples or adapting to learners' changing understanding, struggles, or growing skills. We've developed ExaCraft, an AI system that generates personalized examples by adapting to the learner's dynamic context. Through the Google Gemini AI and Python Flask API, accessible via a Chrome extension, ExaCraft combines user-defined profiles (including location, education, profession, and complexity preferences) with real-time analysis of learner behavior. This ensures examples are both culturally relevant and tailored to individual learning needs. The system's core innovation is its ability to adapt to five key aspects of the learning context: indicators of struggle, mastery patterns, topic progression history, session boundaries, and learning progression signals. Our demonstration will show how ExaCraft's examples evolve from basic concepts to advanced technical implementations, responding to topic repetition, regeneration requests, and topic progression patterns in different use cases.
- Asia > India > Maharashtra > Pune (0.06)
- Asia > India > Maharashtra > Mumbai (0.05)
- North America > Canada > Ontario > Toronto (0.05)
- (3 more...)
- Education > Educational Technology > Educational Software > Computer Based Training (1.00)
- Education > Educational Setting > Online (0.94)
PhishSnap: Image-Based Phishing Detection Using Perceptual Hashing
Minhaz, Md Abdul Ahad, Meem, Zannatul Zahan, Hossain, Md. Shohrab
Phishing remains one of the most prevalent online threats, exploiting human trust to harvest sensitive credentials. Existing URL- and HTML-based detection systems struggle against obfuscation and visual deception. This paper presents \textbf{PhishSnap}, a privacy-preserving, on-device phishing detection system leveraging perceptual hashing (pHash). Implemented as a browser extension, PhishSnap captures webpage screenshots, computes visual hashes, and compares them against legitimate templates to identify visually similar phishing attempts. A \textbf{2024 dataset of 10,000 URLs} (70\%/20\%/10\% train/validation/test) was collected from PhishTank and Netcraft. Due to security takedowns, a subset of phishing pages was unavailable, reducing dataset diversity. The system achieved \textbf{0.79 accuracy}, \textbf{0.76 precision}, and \textbf{0.78 recall}, showing that visual similarity remains a viable anti-phishing measure. The entire inference process occurs locally, ensuring user privacy and minimal latency.
- Asia > Bangladesh > Dhaka Division > Dhaka District > Dhaka (0.06)
- Europe > Austria > Upper Austria (0.05)
FakeZero: Real-Time, Privacy-Preserving Misinformation Detection for Facebook and X
Essahli, Soufiane, Sarsar, Oussama, Bentajer, Ahmed, Motii, Anas, Fouad, Imane
Social platforms distribute information at unprecedented speed, which in turn accelerates the spread of misinformation and threatens public discourse. We present FakeZero, a fully client-side, cross-platform browser extension that flags unreliable posts on Facebook and X (formerly Twitter) while the user scrolls. All computation, DOM scraping, tokenization, Transformer inference, and UI rendering run locally through the Chromium messaging API, so no personal data leaves the device. FakeZero employs a three-stage training curriculum: baseline fine-tuning and domain-adaptive training enhanced with focal loss, adversarial augmentation, and post-training quantization. Evaluated on a dataset of 239,000 posts, the DistilBERT-Quant model (67.6 MB) reaches 97.1% macro-F1, 97.4% accuracy, and an AUROC of 0.996, with a median latency of approximately 103 ms on a commodity laptop. A memory-efficient TinyBERT-Quant variant retains 95.7% macro-F1 and 96.1% accuracy while shrinking the model to 14.7 MB and lowering latency to approximately 40 ms, showing that high-quality fake-news detection is feasible under tight resource budgets with only modest performance loss. By providing inline credibility cues, the extension can serve as a valuable tool for policymakers seeking to curb the spread of misinformation across social networks. With user consent, FakeZero also opens the door for researchers to collect large-scale datasets of fake news in the wild, enabling deeper analysis and the development of more robust detection techniques.
- North America > Canada > Quebec > Montreal (0.04)
- Asia > Singapore (0.04)
- North America > United States > California > San Francisco County > San Francisco (0.04)
- (5 more...)
- Research Report (0.83)
- Instructional Material > Course Syllabus & Notes (0.48)
- Media > News (1.00)
- Information Technology (1.00)
Malicious browser extensions caught spying on 2 million users
Tech expert Kurt Knutsson urges you to use Apple's App Privacy Report to see what your apps are really up to. Every day, millions of people install tiny browser add-ons they believe will improve productivity or entertainment. With so many options available on the Chrome Web Store, users often rely on trust markers like install counts, user reviews and developer reputation to make their choice. Many glance at shiny verification badges and five-star ratings, assume the vetting process was solid, and click "Install" without thinking twice. But attackers have started to exploit these very signals.
Hundreds of Chrome extensions create a web-scraping botnet
Browser extensions can be just as dangerous as regular apps, and their integration with the tool everyone's constantly using can make them seem erroneously innocuous. Case in point: a collection of more than 200 extensions for Chrome and other major browsers are being used to "scrape" website content. This essentially turns browser users into a free data center, with capacity sold off for profit. The Secure Annex report (spotted by Ars Technica) is an interesting one, documenting the MellowTel system. Here's how it works: Step one, a developer of a legitimate extension is offered a tool that integrates a software library into the extension.
- Information Technology > Artificial Intelligence (0.53)
- Information Technology > Data Science > Data Mining > Web Mining (0.40)
- Information Technology > Software (0.40)
- Information Technology > Information Management (0.37)
ASSURE: Metamorphic Testing for AI-powered Browser Extensions
Gao, Xuanqi, Zhai, Juan, Ma, Shiqing, Xie, Siyi, Shen, Chao
The integration of Large Language Models (LLMs) into browser extensions has revolutionized web browsing, enabling sophisticated functionalities like content summarization, intelligent translation, and context-aware writing assistance. However, these AI-powered extensions introduce unprecedented challenges in testing and reliability assurance. Traditional browser extension testing approaches fail to address the non-deterministic behavior, context-sensitivity, and complex web environment integration inherent to LLM-powered extensions. Similarly, existing LLM testing methodologies operate in isolation from browser-specific contexts, creating a critical gap in effective evaluation frameworks. To bridge this gap, we present ASSURE, a modular automated testing framework specifically designed for AI-powered browser extensions. ASSURE comprises three principal components: (1) a modular test case generation engine that supports plugin-based extension of testing scenarios, (2) an automated execution framework that orchestrates the complex interactions between web content, extension processing, and AI model behavior, and (3) a configurable validation pipeline that systematically evaluates behavioral consistency and security invariants rather than relying on exact output matching. Our evaluation across six widely-used AI browser extensions demonstrates ASSURE's effectiveness, identifying 531 distinct issues spanning security vulnerabilities, metamorphic relation violations, and content alignment problems. ASSURE achieves 6.4x improved testing throughput compared to manual approaches, detecting critical security vulnerabilities within 12.4 minutes on average. This efficiency makes ASSURE practical for integration into development pipelines, offering a comprehensive solution to the unique challenges of testing AI-powered browser extensions.
- North America > United States > District of Columbia > Washington (0.05)
- Asia > China > Shaanxi Province > Xi'an (0.05)
- North America > United States > New York > New York County > New York City (0.04)
- (5 more...)
Browser Extension for Fake URL Detection
Malik, Latesh G., Shambharkar, Rohini, Morey, Shivam, Kanpate, Shubhlak, Raut, Vedika
In recent years, Cyber attacks have increased in number, and with them, the intensity of the attacks and their potential to damage the user have also increased significantly. In an ever-advancing world, users find it difficult to keep up with the latest developments in technology, which can leave them vulnerable to attacks. To avoid such situations we need tools to deter such attacks, for this machine learning models are among the best options. This paper presents a Browser Extension that uses machine learning models to enhance online security by integrating three crucial functionalities: Malicious URL detection, Spam Email detection and Network logs analysis. The proposed solution uses LGBM classifier for classification of Phishing websites, the model has been trained on a dataset with 87 features, this model achieved an accuracy of 96.5% with a precision of 96.8% and F1 score of 96.49%. The Model for Spam email detection uses Multinomial NB algorithm which has been trained on a dataset with over 5500 messages, this model achieved an accuracy of 97.09% with a precision of 100%. The results demonstrate the effectiveness of using machine learning models for cyber security.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.36)