• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

September 13, 2020 by Akshay Shendarkar 3 Comments

Google Chrome to add new features to protect against phishing attacks

Looking at the usefulness of Google in reconnaissance activities this week, I wanted to bring to light the latest development made by Google for safe browsing.

Google is working to add a feature to Google Chrome that warns users about similar or lookalike URLs that users may visit thinking they are legitimate sites.

This new feature will alert users when they visit URLs that pretend to lookalike a legitimate URL. For example, Appl3[.]com, tw1tter[.]com, m1crosoft[.]com.

Even though these features are currently available only in ‘Chrome Canary 74’, these are massive strides in the direction of safe internet browsing.

References:

https://cyware.com/news/google-to-add-a-feature-to-chrome-that-warns-users-about-lookalike-urls-481786c6

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Anthony Messina says

    September 14, 2020 at 12:16 am

    This is really good news. Finally a browser taking initiate to defend against typ0squatting. User make tying mistakes all the time when they try to navigate to a URL. This has been a ploy used by attackers for awhile now, and at great success. If Chrome can pull this off it will surely aid defending unsuspecting from navigating to a spoofed site by way of a typing error.

    Log in to Reply
  2. Rudraduttsinh says

    September 14, 2020 at 2:35 pm

    New Unpatched Bluetooth Flaw Lets Hackers Easily Target Nearby Devices
    The Bluetooth SIG- an organization that manages the development of Bluetooth standards-issued a statement that a newly unpatched vulnerability potentially affects millions of hundreds of devices worldwide. Two sperate teams of academic researchers discovered the flaw. The flaw resides in the cross-transport key derivation (CTKD) supporting introductory rate/enhanced data rate Bluetooth (BR/EDR) and Bluetooth low energy (BLE) standards (Kumar, 2020). CTKD is the Bluetooth component is responsible for negotiating authentication keys when pairing two Bluetooth devices. The flaw (“BlURtooth tracked as CVE-202-15802) exposes devices powered with 4.0 and 5.0 technology, allowing attackers to unauthorizedly connect to the nearby device by overwriting the authenticated key or reducing the encryption key strength. “Dual-mode devices using the CTKD generated long term keys (LTK)or link keys (LK) can overwrite the original LTK or LK in cases that transport was enforcing a higher level of security.” In layman terms, under specific implementations of the pairing process, the authorization keys could be overwritten when it is required to enforce higher security. According to an advisory published by Carnegie Mellon CERT coordination center, the flaw can lead to several potential attacks, grouped as ‘BLURattacks,’ including man-in-the-middle attack,
     
    References
    Kumar.Mohit. (September 10,2020). New Unpatched Bluetooth Flaw Lets Hackers Easily Target Nearby DevicesThe hacker news. Retrieved from https://thehackernews.com/2020/09/new-bluetooth-vulnerability.html

    Log in to Reply
  3. Mei X Wang says

    September 17, 2020 at 10:43 am

    I’m glad to hear Google is creating such simple but easy fixes to problems that have been prevalent around the web for so long. Since many users such as myself rely heavily on chrome browser, this is great news. Also tools such as the certificate authorities, “the lock logo” to signify the connection is through a secure browser, can all be used as small tips that can help us differentiate the authenticity and safety of a site!

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in