chrome extension
- Information Technology > Security & Privacy (1.00)
- Leisure & Entertainment > Games > Computer Games (0.74)
- North America > United States > Minnesota > Hennepin County > Minneapolis (0.05)
- North America > United States > Illinois (0.04)
- Asia > North Korea (0.04)
- Media > News (1.00)
- Health & Medicine > Therapeutic Area > Psychiatry/Psychology (0.72)
- Government > Regional Government > North America Government > United States Government (0.70)
- Transportation > Ground > Road (0.47)
OpenCUA: Open Foundations for Computer-Use Agents
Wang, Xinyuan, Wang, Bowen, Lu, Dunjie, Yang, Junlin, Xie, Tianbao, Wang, Junli, Deng, Jiaqi, Guo, Xiaole, Xu, Yiheng, Wu, Chen Henry, Shen, Zhennan, Li, Zhuokai, Li, Ryan, Li, Xiaochuan, Chen, Junda, Zheng, Boyuan, Li, Peihang, Lei, Fangyu, Cao, Ruisheng, Fu, Yeqiao, Shin, Dongchan, Shin, Martin, Hu, Jiarui, Wang, Yuyan, Chen, Jixuan, Ye, Yuxiao, Zhang, Danyang, Du, Dikang, Hu, Hao, Chen, Huarong, Zhou, Zaida, Yao, Haotian, Chen, Ziwei, Gu, Qizheng, Wang, Yipu, Wang, Heng, Yang, Diyi, Zhong, Victor, Sung, Flood, Charles, Y., Yang, Zhilin, Yu, Tao
Vision-language models have demonstrated impressive capabilities as computer-use agents (CUAs) capable of automating diverse computer tasks. As their commercial potential grows, critical details of the most capable CUA systems remain closed. As these agents will increasingly mediate digital interactions and execute consequential decisions on our behalf, the research community needs access to open CUA frameworks to study their capabilities, limitations, and risks. To bridge this gap, we propose OpenCUA, a comprehensive open-source framework for scaling CUA data and foundation models. Our framework consists of: (1) an annotation infrastructure that seamlessly captures human computer-use demonstrations; (2) AgentNet, the first large-scale computer-use task dataset spanning 3 operating systems and 200+ applications and websites; (3) a scalable pipeline that transforms demonstrations into state-action pairs with reflective long Chain-of-Thought reasoning that sustain robust performance gains as data scales. Our end-to-end agent models demonstrate strong performance across CUA benchmarks. In particular, OpenCUA-72B achieves an average success rate of 45.0% on OSWorld-Verified, establishing a new state-of-the-art (SOTA) among open-source models. Further analysis confirms that our approach generalizes well across domains and benefits significantly from increased test-time computation. We release our annotation tool, datasets, code, and models to build open foundations for further CUA research.
- Workflow (1.00)
- Research Report > New Finding (0.46)
- Information Technology > Software (0.68)
- Information Technology > Security & Privacy (0.67)
- Information Technology > Services (0.46)
Demo: TOSense -- What Did You Just Agree to?
Chen, Xinzhang, Ali, Hassan, Shaghaghi, Arash, Kanhere, Salil S., Jha, Sanjay
Online services often require users to agree to lengthy and obscure Terms of Service (ToS), leading to information asymmetry and legal risks. This paper proposes TOSense-a Chrome extension that allows users to ask questions about ToS in natural language and get concise answers in real time. The system combines (i) a crawler "tos-crawl" that automatically extracts ToS content, and (ii) a lightweight large language model pipeline: MiniLM for semantic retrieval and BART-encoder for answer relevance verification. To avoid expensive manual annotation, we present a novel Question Answering Evaluation Pipeline (QEP) that generates synthetic questions and verifies the correctness of answers using clustered topic matching. Experiments on five major platforms, Apple, Google, X (formerly Twitter), Microsoft, and Netflix, show the effectiveness of TOSense (with up to 44.5% accuracy) across varying number of topic clusters. During the demonstration, we will showcase TOSense in action. Attendees will be able to experience seamless extraction, interactive question answering, and instant indexing of new sites.
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (0.90)
- Information Technology > Artificial Intelligence > Natural Language > Question Answering (0.70)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning (0.70)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.46)
Hundreds of Chrome extensions create a web-scraping botnet
Browser extensions can be just as dangerous as regular apps, and their integration with the tool everyone's constantly using can make them seem erroneously innocuous. Case in point: a collection of more than 200 extensions for Chrome and other major browsers are being used to "scrape" website content. This essentially turns browser users into a free data center, with capacity sold off for profit. The Secure Annex report (spotted by Ars Technica) is an interesting one, documenting the MellowTel system. Here's how it works: Step one, a developer of a legitimate extension is offered a tool that integrates a software library into the extension.
- Information Technology > Artificial Intelligence (0.53)
- Information Technology > Data Science > Data Mining > Web Mining (0.40)
- Information Technology > Software (0.40)
- Information Technology > Information Management (0.37)
EXPLICATE: Enhancing Phishing Detection through Explainable AI and LLM-Powered Interpretability
Lim, Bryan, Huerta, Roman, Sotelo, Alejandro, Quintela, Anthonie, Kumar, Priyanka
Sophisticated phishing attacks have emerged as a major cybersecurity threat, becoming more common and difficult to prevent. Though machine learning techniques have shown promise in detecting phishing attacks, they function mainly as "black boxes" without revealing their decision-making rationale. This lack of transparency erodes the trust of users and diminishes their effective threat response. We present EXPLICATE: a framework that enhances phishing detection through a three-component architecture: an ML-based classifier using domain-specific features, a dual-explanation layer combining LIME and SHAP for complementary feature-level insights, and an LLM enhancement using DeepSeek v3 to translate technical explanations into accessible natural language. Our experiments show that EXPLICATE attains 98.4 % accuracy on all metrics, which is on par with existing deep learning techniques but has better explainability. High-quality explanations are generated by the framework with an accuracy of 94.2 % as well as a consistency of 96.8\% between the LLM output and model prediction. We create EXPLICATE as a fully usable GUI application and a light Chrome extension, showing its applicability in many deployment situations. The research shows that high detection performance can go hand-in-hand with meaningful explainability in security applications. Most important, it addresses the critical divide between automated AI and user trust in phishing detection systems.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.55)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Performance Analysis > Accuracy (0.97)
CowPilot: A Framework for Autonomous and Human-Agent Collaborative Web Navigation
Huq, Faria, Wang, Zora Zhiruo, Xu, Frank F., Ou, Tianyue, Zhou, Shuyan, Bigham, Jeffrey P., Neubig, Graham
While much work on web agents emphasizes the promise of autonomously performing tasks on behalf of users, in reality, agents often fall short on complex tasks in real-world contexts and modeling user preference. This presents an opportunity for humans to collaborate with the agent and leverage the agent's capabilities effectively. We propose CowPilot, a framework supporting autonomous as well as human-agent collaborative web navigation, and evaluation across task success and task efficiency. CowPilot reduces the number of steps humans need to perform by allowing agents to propose next steps, while users are able to pause, reject, or take alternative actions. During execution, users can interleave their actions with the agent by overriding suggestions or resuming agent control when needed. We conducted case studies on five common websites and found that the human-agent collaborative mode achieves the highest success rate of 95% while requiring humans to perform only 15.2% of the total steps. Even with human interventions during task execution, the agent successfully drives up to half of task success on its own. CowPilot can serve as a useful tool for data collection and agent evaluation across websites, which we believe will enable research in how users and agents can work together. Video demonstrations are available at https://oaishi.github.io/cowpilot.html
- North America > United States > Pennsylvania > Allegheny County > Pittsburgh (0.04)
- North America > United States > New York (0.04)
- North America > United States > Florida > Miami-Dade County > Miami (0.04)
- Asia > Thailand > Bangkok > Bangkok (0.04)
- Research Report (0.50)
- Workflow (0.49)
A new Chrome extension can reliably detect AI-generated voices
Just in time for the 2024 US elections, the call screening and fraud detection company Hiya has launched a free Chrome extension to spot deepfake voices. The aptly named Hiya Deepfake Voice Detector "listens" to voices played in video or audio streams and assigns an authenticity score, telling you whether it's likely real or fake. Hiya tells Engadget that third-party testers have validated the extension as over 99 percent accurate. The company says that even covers AI-generated voices the detection model hasn't trained on, and the company claims it can spot voices created by new synthesis models as soon as they're launched. We played around with the extension ahead of launch, and it seems to work well.
- Information Technology (0.71)
- Law Enforcement & Public Safety > Fraud (0.59)
NoPhish: Efficient Chrome Extension for Phishing Detection Using Machine Learning Techniques
Thaqi, Leand, Halili, Arbnor, Vishi, Kamer, Rexha, Blerim
The growth of digitalization services via web browsers has simplified our daily routine of doing business. But at the same time, it has made the web browser very attractive for several cyber-attacks. Web phishing is a well-known cyberattack that is used by attackers camouflaging as trustworthy web servers to obtain sensitive user information such as credit card numbers, bank information, personal ID, social security number, and username and passwords. In recent years many techniques have been developed to identify the authentic web pages that users visit and warn them when the webpage is phishing. In this paper, we have developed an extension for Chrome the most favorite web browser, that will serve as a middleware between the user and phishing websites. The Chrome extension named "NoPhish" shall identify a phishing webpage based on several Machine Learning techniques. We have used the training dataset from "PhishTank" and extracted the 22 most popular features as rated by the Alexa database. The training algorithms used are Random Forest, Support Vector Machine, and k-Nearest Neighbor. The performance results show that Random Forest delivers the best precision.
- Europe > Norway > Eastern Norway > Oslo (0.04)
- Europe > Kosovo > District of Pristina > Pristina (0.04)
- North America > United States > New York > New York County > New York City (0.04)
- (2 more...)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.69)
- Information Technology > Artificial Intelligence > Machine Learning > Performance Analysis > Accuracy (0.70)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning > Nearest Neighbor Methods (0.69)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning > Support Vector Machines (0.55)
PhishNet: A Phishing Website Detection Tool using XGBoost
Kumar, Prashant, Antony, Kevin, Banga, Deepakmoney, Sohal, Arshpreet
PhisNet is a cutting-edge web application designed to detect phishing websites using advanced machine learning. It aims to help individuals and organizations identify and prevent phishing attacks through a robust AI framework. PhisNet utilizes Python to apply various machine learning algorithms and feature extraction techniques for high accuracy and efficiency. The project starts by collecting and preprocessing a comprehensive dataset of URLs, comprising both phishing and legitimate sites. Key features such as URL length, special characters, and domain age are extracted to effectively train the model. Multiple machine learning algorithms, including logistic regression, decision trees, and neural networks, are evaluated to determine the best performance in phishing detection. The model is finely tuned to optimize metrics like accuracy, precision, recall, and the F1 score, ensuring reliable detection of both common and sophisticated phishing tactics. PhisNet's web application is developed using React.js, which allows for client-side rendering and smooth integration with backend services, creating a responsive and user-friendly interface. Users can input URLs and receive immediate predictions with confidence scores, thanks to a robust backend infrastructure that processes data and provides real-time results. The model is deployed using Google Colab and AWS EC2 for their computational power and scalability, ensuring the application remains accessible and functional under varying loads. In summary, PhisNet represents a significant advancement in cybersecurity, showcasing the effective use of machine learning and web development technologies to enhance user security. It empowers users to prevent phishing attacks and highlights AI's potential in transforming cybersecurity.
- North America > Canada > New Brunswick > Fredericton (0.04)
- Asia > Middle East > Saudi Arabia > Riyadh Province > Riyadh (0.04)
- Asia > Middle East > Jordan (0.04)
- Asia > India > Punjab (0.04)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.55)