D-Link’s D-Fend AC2600 router uses McAfee to protect your entire network
With the internet now an essential part of most people’s daily lives, the router that’s at the heart of every home’s connectivity has become increasingly important. And while we all reap the benefits of that access, it’s often easy to overlook the aspects that could negatively affect your family and home if left unmonitored and…
With the internet now an essential part of most people’s daily lives, the router that’s at the heart of every home’s connectivity has become increasingly important. And while we all reap the benefits of that access, it’s often easy to overlook the aspects that could negatively affect your family and home if left unmonitored and unprotected.
With threats like malicious attacks (such as malware, botware, cryptojacking and more) and content or activities that are particularly unsafe for children (not to mention rising problems such as screen and video game addiction), router-makers have started to integrate more sophisticated tools to let households deal with these issues.
D-Link is the latest to turn its attention towards better home-network protection and has teamed up with the antivirus
Fake AI sidebars can perfectly imitate real ones to steal secrets, experts warn Malicious extensions need only minimal permissions to cause maximum chaos AI browsers risk turning helpful automation into channels for silent data theft New “agentic” browsers which offer an AI-powered sidebar promise convenience but may widen the window for deceptive attacks, experts have
Published
1 day ago
in
By
Fake AI sidebars can perfectly imitate real ones to steal secrets, experts warn
Malicious extensions need only minimal permissions to cause maximum chaos
AI browsers risk turning helpful automation into channels for silent data theft
New “agentic” browsers which offer an AI-powered sidebar promise convenience but may widen the window for deceptive attacks, experts have warned.
Researchers from browser security firm SquareX found a benign-looking extension can overlay a counterfeit sidebar onto the browsing surface, intercept inputs, and return malicious instructions that appear legitimate.
This technique undermines the implicit trust users place in in-browser assistants and makes detection difficult because the overlay mimics standard interaction flows.
You may like
OpenAI’s new Atlas browser may have some extremely concerning security issues, experts warn – here’s what we know
Millions of users have fallen victim to malicious browser extensions because of a critical flaw, but things are changing — here’s what you need to know
The surveillance browser trap: AI companies are copying Big Tech’s worst privacy mistakes
How the spoofing works in practice
The attack uses extension features to inject JavaScript into web pages, rendering a fake sidebar that sits above the genuine interface and captures user actions.
Reported scenarios include directing users to phishing sites and capturing OAuth tokens through fake file-sharing prompts. It also recommends commands that install remote access backdoors on victims’ devices.
The consequences escalate quickly when these instructions involve account credentials or automated workflows.
Many extensions request broad permissions, such as host access and storage, that are commonly granted to productivity tools, which reduces the value of permission analysis as a detection method.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Conventional antivirus suites and browser permission models were not designed to recognize a deceptive overlay that never modifies the browser code itself.
As more vendors integrate sidebars across major browser families, the collective attack surface expands and becomes harder to secure.
Users should treat in-browser AI assistants as experimental features and avoid handling sensitive data or authorizing account linkages through them, because doing so can greatly raise the risk of compromise.
You may like
OpenAI’s new Atlas browser may have some extremely concerning security issues, experts warn – here’s what we know
Millions of users have fallen victim to malicious browser extensions because of a critical flaw, but things are changing — here’s what you need to know
The surveillance browser trap: AI companies are copying Big Tech’s worst privacy mistakes
Security teams should tighten extension governance, implement stronger endpoint controls, and monitor for abnormal OAuth activity to reduce risk.
The threat also links directly to identity theft when fraudulent interfaces harvest credentials and session tokens with convincing accuracy.
Agentic browsers introduce new convenience while also creating new vectors for social engineering and technical abuse.
Therefore, vendors need to build interface integrity checks, improve extension vetting, and provide clearer guidance about acceptable use.
Until those measures are widely established and audited, users and organizations should remain skeptical about trusting sidebar agents with any tasks involving sensitive accounts.
Security teams and vendors must prioritize practical mitigations, including mandatory code audits for sidebar components and transparent update logs that users and administrators can review regularly.
Via BleepingComputer
The best antivirus for all budgets
Our top picks, based on real-world testing and comparisons
➡️ Read our full guide to the best antivirus 1. Best overall: Bitdefender Total Security 2. Best for families: Norton 360 with LifeLock 3. Best for mob
Email security has always been a cat-and-mouse game. Viruses are invented, and antivirus software is invented to catalog known viruses and detect their presence in email attachments and URLs. As viruses morphed into more sophisticated forms of malware, cybersecurity tools adapted to be able to scan for and detect these new threats…
Published
4 days ago
in
By
Email security has always been a cat-and-mouse game. Viruses are invented, and antivirus software is invented to catalog known viruses and detect their presence in email attachments and URLs. As viruses morphed into more sophisticated forms of malware, cybersecurity tools adapted to be able to scan for and detect these new threats… Read More
I like picking up practical deals during big sale periods. So, with Amazon Prime Big Deal Days lasting until 11:59pm PT tonight, I’ve been hunting for bargains on less splashy items—like security software. Turns out, you can save as much as 70 percent on several of our top picks for antivirus and password managers right
Published
3 weeks ago
in
By
I like picking up practical deals during big sale periods. So, with Amazon Prime Big Deal Days lasting until 11:59pm PT tonight, I’ve been hunting for bargains on less splashy items—like security software. Turns out, you can save as much as 70 percent on several of our top picks for antivirus and password managers right now… Read More
Macworld At a glanceExpert’s Rating Pros macOS’ Gatekeeper and XProtect functions work well together to block or quarantine the most obvious malware and throw up multiple warning prompts before harmful software can be installed. Good automatic cleanup, and in many cases, the Gatekeeper function quarantines and deletes suspect software…
Published
1 month ago
in
By
Macworld
At a glanceExpert’s Rating
Pros
macOS’ Gatekeeper and XProtect functions work well together to block or quarantine the most obvious malware and throw up multiple warning prompts before harmful software can be installed.
Good automatic cleanup, and in many cases, the Gatekeeper function quarantines and deletes suspect software… Read More