![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104352/google-chrome-skull-400x200.jpg)
How to keep your browser and devices safe from cryptojackers
Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103115/google_chrome-1-400x200.jpg)
Chrome site isolation option offers more security
Chrome 63, which was promoted to the stable release channel on Wednesday, comes with many security fixes and improvements, especially for the enterprise audience. Site …
![SF](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104041/sf-400x200.jpg)
Stealthy in-browser cryptomining continues even after you close window
In-browser cryptocurrency mining is, in theory, a neat idea: make users’ computers “mine” Monero for website owners so they don’t have to bombard users …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110819/google-chrome-400x200.jpg)
Chrome to start blocking unwanted redirects
“1 out of every 5 feedback reports from Chrome users on desktop mention encountering some type of unwanted content, and we take this feedback seriously when considering …
![Google Chrome biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103556/chrome-biohazard-400x200.jpg)
Malicious Chrome extension steals all data
There’s a glut of malicious Google Chrome extensions out there, but some are more harmful than others. The one that SANS ISC incident handler Renato Marinho has dubbed …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102900/google_chrome_window-400x200.jpg)
ESET helps Google protect Chrome users from unwanted software
Google has redesigned Chrome Cleanup on Chrome for Windows, and has upgraded the technology it uses to detect and remove unwanted software. A basic antivirus for Chrome …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103115/google_chrome-1-400x200.jpg)
Google Chrome most resilient against attacks, researchers find
Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks. “Modern web browsers such as …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103140/google_chrome-400x200.jpg)
Chrome will tag FTP sites as “Not secure”
Google Chrome 63, expected to be released sometime around December, will label resources delivered over the FTP protocol as “Not secure”, a member of the Chrome …
![Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110806/chrome-400x200.jpg)
Google Chrome remote code execution flaw detailed, PoC released
Vulnerability broker Beyond Security has released details about and Proof of Concept code for a remote code execution bug affecting Google Chrome. “The [type confusion] …
![Google Chrome biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103556/chrome-biohazard-400x200.jpg)
Another popular Chrome extension hijacked through phishing
Chris Pederick, the creator and maintainer of the Web Developer for Chrome extension, is the latest victim of attackers who hijack popular Chrome add-ons in order to push ads …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112300/phishing-400x200.jpg)
Phishers steal Chrome extension from developer
An attacker has compromised the Chrome Web Store account of German developer team a9t9 software, and has equipped their Copyfish Chrome extension with ad/spam injection …
![https](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195334/https-400x200.jpg)
Number of HTTPS phishing sites triples
When, in January 2017, Mozilla and Google made Firefox and Chrome flag HTTP login pages as insecure, the intent was to make phishing pages easier to recognize, as well as push …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)