New Chrome Attacks – Millions at Risk; Millions of Email Servers Vulnerable to Attack; Upgrading to Wi-Fi 7 Will Get More Complicated… and more!
Every day, we scan the tech world for interesting news, sometimes from outside the tech world. Every Thursday, we feature news articles that grabbed our attention over the past week. We hope you find this week’s ‘Thursday Newsbytes’ informative and interesting!
New Google Chrome Attacks Bypass More Than Just 2FA—Millions At Risk
I recently reported how millions of Google Chrome users were being put at risk by dozens of fake browser extensions as part of an attack that replaced the genuine ones in order to bypass 2FA protections. If you thought that things couldn’t get much worse, you’d be wrong: new security and privacy analysis has revealed how hackers are manipulating Google’s search protections to expose hundreds of millions more users to malicious and potentially dangerous extensions. Here’s what you need to know.
How Hackers Manipulate Google Search To Distribute Dodgy Chrome Extensions
Although the wave of attacks towards the end of 2024 that replaced genuine Google Chrome web browser extensions with malicious duplicates capable of bypassing account 2FA protections used phishing methodology to gain access to the developer accounts required to pull off the switch, phishing is not the only tactic that is being employed by dodgy extension threat actors…
Experts warn millions of email servers could be vulnerable to attack
Over 3 million IMAP and POP3 mail servers are without TLS encryption
New research from ShadowServer has revealed 3.3 million POP3 (Post Office Protocol) and IMAP (Internet Message Access Protocol) mail servers are currently exposed to network sniffing attacks, due to being without TLS encryption.
TLS, or Transport Layer Security, is a security protocol which provides end-to-end security between applications over the Internet. It is used for secure web browsing, and encrypts communications through email, file transfer, and messaging.
Time to retire
Without TLS, passwords for mail access could be intercepted, and that exposed services could allow password guessing attacks on the server. Without the encryption, credentials and message content is sent in clear text, which exposes hosts to eavesdropping network sniffing attacks…
Upgrading to Wi-Fi 7 is about to get more complicated — and these new routers are to blame
Imagine buying a new device only to find out after the fact that it can’t do what you expected it to. If something doesn’t change soon, this could very well become a common occurrence with the best Wi-Fi 7 routers.
As we move from one wireless standard to the next, faster speeds are usually the biggest selling point and one of the main reasons people upgrade in the first place. Over the past few years, we’ve seen a big jump in Wi-Fi speeds, and the reason for this is that with Wi-Fi 6E, you’re able to use a brand new band in addition to the 2.4 and 5 GHz bands found on all of the best Wi-Fi routers.
With a Wi-Fi 6E-powered router, you also get access to the 6 GHz band, which has a theoretical top speed of 9.6 gigabits per second (Gbps). While the 5 GHz band also tops out at this same theoretical speed, one of the reasons the 6 GHz band feels a lot faster is due to the fact that it’s less crowded since most of our other connected devices use the other two bands instead. Likewise, the 6 GHz Wi-Fi spectrum is also wider at 1,200 MHz and sports even larger data channels…
What Are Social Security-Related Scams?
Criminals continue to impersonate SSA and other government agencies in an attempt to obtain personal information or money.
Scammers might call, email, text, write, or message you on social media claiming to be from the Social Security Administration or the Office of the Inspector General. They might use the name of a person who really works there and might send a picture or attachment as “proof.”
Social Security employees do contact the public by telephone for business purposes. Ordinarily, the agency calls people who have recently applied for a Social Security benefit, are already receiving payments and require an update to their record, or have requested a phone call from the agency. If there is a problem with a person’s Social Security number or record, Social Security will typically mail a letter.
Four Basic Signs of a Scam
Recognizing the signs of a scam gives you the power to ignore criminals and report the scam.
Scams come in many varieties, but they all work the same way:
— Scammers pretend to be from an agency or organization you know to gain your trust.
— Scammers say there is a problem or a prize.
— Scammers pressure you to act immediately.
— Scammers tell you to pay in a specific way.
Dell roasted at CES for adopting Apple-like device names
Heads up: Pro Premium and Pro Max Premium are two different things.
Dell rebranded all of its PCs at CES 2025, and while it might ultimately be more simple to understand in the long run, everyone seemed to immediately notice some similarities to Apple’s approach.
Rather than going by nonsense names like “XPS” and “Inspiron,” every Dell machine will now be separated into three categories: Dell, Dell Pro, and Dell Pro Max. This is, of course, very similar to Apple’s approach to naming its devices. Per Bloomberg (via 9to5mac), people in the audience at Dell’s CES press conference noted it verbally…
Thanks for reading this week’s Thursday Newbytes. We hope these articles were informative, interesting, fun, and helpful.
Dell is starting to sound like Microsoft mail in my opinion…