Years ago, I had a neighbor who left his network open, and I would randomly fire off a script that would simultaneously access his floppy drives from multiple computers, creating a similar effect to this vulnerability – but my floppy drive attack would lock up the whole machine by using all the I/O the device […]
Read MoreMalware comes in many forms, but extensions and add-ons to Chrome and other browsers are one of the most common for home users to contract. Once infected, browsers can be almost impossible to clean, and this extension is particularly rough. Google has taken their time in removing it from their online store, which doesn’t help. […]
Read More