Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Google Sounds Chrome Browser Hijack Alarm
Newest First  |  Oldest First  |  Threaded View
Federal
50%
50%
Federal,
User Rank: Apprentice
8/18/2014 | 6:03:22 PM
The latest version of this exploit blocks access to settings (so you can't reset)
The latest version of this exploit blocks access to settings (so you can't reset).  It's still an extension, though, so there's a workaround to fix it.  Power down the chromebook then power it back on.  The extensions take a second or so to load and the load doesn't take place until you log in.


Enter your password after the restart but have one finger on the ESC key before you hit enter to log in.  Keep hitting ESC for a few seconds after you click enter to log in.  You have to catch the browser before it loads its settings and extensions but it's pretty easy to do. Now you'll have stopped the browser from loading the extension that sets your session to "anonymous" blocking all access to settings. From here, it's easy to go to settings and either disable the offending extension or just reset the browser settings.
Howard Fried
50%
50%
Howard Fried,
User Rank: Apprentice
2/7/2014 | 9:40:02 PM
Ads do pay the bills, but use some tact
As David mentions, the reality is most of the internet is paid for with ads...so...the real question is, how can you make money with ads, and not be totally obnoxious, annoying and intrusive?

My team is hard at work on a product that intends to be graceful, mostly hidden, and always seek your consent to show ads and offers. Watch for a release later this year of a new kind of browser safety extension (free) from avira.com
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
2/5/2014 | 9:56:26 AM
Re: Ads and security
I miss the days of when using an "alternative" browser like Chrome or Firefox meant there was nothing to fear as nobody made viruses for anything but IE. I imagine Apple users feel the same way. 
David F. Carr
50%
50%
David F. Carr,
User Rank: Strategist
2/5/2014 | 9:12:30 AM
Re: Ads and security
Ads still pay the bills, unless you operate like NPR
Lorna Garey
50%
50%
Lorna Garey,
User Rank: Ninja
2/4/2014 | 4:50:27 PM
Favorites?
Does resetting wipe out favorites along with cookies, tabs, etc?
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Ninja
2/4/2014 | 4:05:47 PM
Ads and security
There's a fundamental problem here: Ads, as content injected from a third-party domain, represent a threat vector. Playing whac-a-mole with malicious extension providers is one approach. Blocking ads entirely is another.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness
Robert Lemos, Contributing Writer,  7/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19453
PUBLISHED: 2020-08-03
Wowza Streaming Engine through 2019-11-28 allows XSS (issue 1 of 2).
CVE-2019-19455
PUBLISHED: 2020-08-03
Wowza Streaming Engine through 2019-11-28 has Insecure Permissions.
CVE-2020-4560
PUBLISHED: 2020-08-03
IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2019-4589
PUBLISHED: 2020-08-03
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to privlege escalation where the "My schedules and subscriptions" page is visible and accessible to a less privileged user. IBM X-Force ID: 167449.
CVE-2020-4328
PUBLISHED: 2020-08-03
IBM Financial Transaction Manager 3.2.4 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 177839.