TechBlogs.Site

New Updates for Technology Lovers

BE CAREFUL OF CHROME BROWSER USERS, HACK MAY BE YOUR SAVED CHROME PASSWORD

BE CAREFUL OF CHROME BROWSER USERS, HACK MAY BE YOUR

CHROME PASSWORD:-

CHROME PASSWORD / best chrome extension for user

 

The Global cybersecurity company Palo Alto has discovered a  new malware that can be used to hack the text messages of users after saving the user name and passwords saved in Google Chrome credit card information or other password CHROME PASSWORD saved in and back in Mac. Unit 42, part of the Palo Alto Networks, said that the malware named Cookie Miner is able to steal the valet service websites visited by browser cookies and hunting associated with mainstream Cryptococci exchanges.

 

This malware stole text message:-

This malware steals the text message of the iPhone by taking the passwords in Chrome/CHROME PASSWORD  and iTunes backups on Mac. Studies said, “Based on the previous attacks of the same kind, by taking advantage of a combination of theft information, web cookies, and SMS data, we believe that the bad factors change the way of multi-functional authentication for these sites Can. ”

 

Plug-ins do this way:-

Please follow the following steps to avoid “CHROME PASSWORD attack”

First, you need to enter your password by going to the login page of the favorite website (facebook/twitter or other). As soon as you enter the password, you will have a pop up in English ‘The password you have entered in 26 data breaks. This password is not safe to use ‘means that the password you entered is found in 26 data theft. This password is not secure.

Once you remove the ‘Warning’ popup, it will depend on whether you use that password or not. After this you will not see a popup if you log in again. This plug-in just works in Google’s Chrome browser now. The idea of the company is to launch it for a Firefox browser. One more thing, the plug-in only looks for the password, not the user name.

 

 

Take control of hunting accounts on account:-

If the attacker succeeds, they have full control over the exchange account and valet of the prey and become the executors of the hunting fund because they have become themselves users. Configures the system to load the coeiling software on the malware system. Web cookies have extensive use in authentication. When a user logs in to a website, its cookies are stored for the web server to know the log-in status.

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *

TechBlogs.Site © 2018 StatusDalo.Com