Advertisement
AD

Main navigation

Google Tightens Rules for Extension Makers to Protect Users from Cryptojacking

Advertisement
Tue, 2/10/2018 - 14:18
Google Tightens Rules for Extension Makers to Protect Users from Cryptojacking
Cover image via U.Today
Read U.TODAY on
Google News

The Internet giant intends to introduce several changes to the manner it deals with Chrome extensions that require additional permissions. Besides, the company is introducing more rigorous rules for IT experts who develop and sell their extensions through the Chrome online store.

Advertisement

Google: extensions should be safe

In Monday’s blog post, Google team wrote that customers should be convinced that they download safe extensions which will keep their data private and ensure good performance.

In the new version of Chrome browser, consumers will be able to set limits to extensions when it comes to accessing custom lists of websites or to change extension settings so that they demand permission every time they require access to a Web page.

Related
Bitcoin’s Blockchain Shows Major Vulnerability- What Happens If Blockchain Can Be Breached?

Google emphasizes that if an extension insists on permissions it will be taken down for a special review. Extensions that have a code of a distant hosting will also be carefully watched and scrutinized.

Danger of being misused

Google spoke about this step saying that host permissions, even though they allowed users to utilize them in various creative ways, also caused a great deal of misuse. Hackers often took advantage of that. Now Google intends to protect user data from malicious attacks.

Also, from now on the company will ban extensions that have any hidden or obfuscated code inside them.

The blog post claims that over 70 percent of extensions are dangerous for users and contain that sort of code and are sold in the Google’s Web store. Besides, this type of codes makes the reviewing of extensions for Google more difficult.

card

Anti-hacker measures

In Google, they believe that access to user data must belong only to users. Another measure to achieve this is the new policy which implies that a 2-step verification must be implemented for all accounts of extension developers. This should prevent hackers from taking over those accounts.

Earlier, computer criminals used extensions in the Google browser to gain access to computers of victims.

Google has also opened a witch hunt on extensions that allow hackers to mine crypto coins without users knowing about it.

Advertisement
TopCryptoNewsinYourMailbox
TopCryptoNewsinYourMailbox
Advertisement

Latest Press Releases

Our social media
There's a lot to see there, too

Popular articles

Advertisement
AD