SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Reading: AI browsers can be abused by malicious AI sidebar extensions: Report – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > AI > AI browsers can be abused by malicious AI sidebar extensions: Report – Computerworld
AI

AI browsers can be abused by malicious AI sidebar extensions: Report – Computerworld

News Room
Last updated: October 24, 2025 12:46 am
News Room
Share
2 Min Read
SHARE

“I think it’s a mistake to think of the risk as just being about extensions,” he added. “It’s the fundamental DNA of these browsers that is bad; the companies aren’t incented to pay enough attention to the problems, and bad extensions are just the straw that breaks cybersecurity’s back.”

How it works

CISOs have a tough challenge: It’s not hard to fool an employee into downloading and installing a malicious extension for any browser; browser extensions are supposed to be attractive add-on utilities such as password managers or AI productivity assistants. They are promoted in phishing and smishing messages, social media posts and, when threat actors are able, uploaded to marketplaces such as the Google Chrome Web Store. They can be malware disguised as a legitimate extension or can be a compromised version of one.

In AI Sidebar Spoofing, says the SquareX report, once a victim opens a new AI browser tab, the malicious extension injects JavaScript into the web page to create a fake sidebar that looks exactly like a legitimate sidebar. When the user enters a prompt into the spoofed sidebar, the extension hooks into its AI engine. But if the prompt requests certain instructions or guides, the responses can be manipulated to include additional instructions to the user. So, for example, if the user asks for good file sharing sites, the malicious extension might provide a link to the attacker’s file sharing site that requests high risk OAuth permissions that it can harvest. In the hands of a hacker, they could allow access to the victim’s email.

Read the full article here

You Might Also Like

Does talk of government backstops mean an AI bubble is about to burst? – Computerworld

OpenAI’s company knowledge wants access to all of your internal data – Computerworld

Asana puts ‘AI teammate’ agents to work – Computerworld

Does the M5-based iPad Pro change the tablet/laptop equation? – Computerworld

OpenAI spends even more money it doesn’t have – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

Gearbox finally fixes Borderlands 4’s infuriating class mod drops and snore-inducing Wildcards—oh, and its first DLC is now free

November 23, 2025
Games

How to complete The Major’s Footlocker in Arc Raiders

November 23, 2025
Games

It’s a shame HoYoverse’s new game is sporting offensively cheap-looking character models because everything else has me sold on its paranormal cop mystery

November 23, 2025
Games

Ahead of Black Friday, Fanatical has dropped more comic and book bundles than I know what to do with, covering Dragon Age, Mass Effect, Cyberpunk 2077, Halo, and more

November 23, 2025
Games

The original Dawn of War games have 109 new Steam achievements after 20 years—if you have the definitive edition, at least

November 23, 2025
Games

The League of Legends trading card game is surprisingly good because it embraces the best trends in card games

November 23, 2025

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?