There's a new hacking trend on the scene, and it seems like it's more difficult to spot, and it's certainly more malicious. 

It's called browser-based malware. 

Chaos Computer Club 28th Congress
Getty Images
loading...

It's just now being noticed by data security experts, and it's insidious because it hides inside URLs like Google.com. 

According to msn.com,
A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect. It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user's browser session.’ 

Computer hacker using smartphone
stevanovicigor
loading...

The key to making this scam work is that the hacker uses a well-known and trusted URL like Google.com that enables the hacker to bypass traditional antivirus software. 

Now this malware only activates under certain conditions. Honestly, I don't understand most of this “hacker speak”. I would have to talk to my youngest son John, and he could explain it to me.  

Obama Outlines Policy For Open And Free Internet
Getty Images
loading...

Since your initial request is to a legitimate domain like google.com, most Android antivirus apps and static malware scanners are ineffective. Your antivirus software will not inspect, Flag or block JavaScript that is seemingly delivered through authentic “OAuth” flows. 

So how do you protect yourself? 

Well, the first thing is to limit third-party scripts. Use separate browser sessions for any kind of financial transactions and continue to watch out for unusual or unexpected web behavior. 

3d image Data Breach issues concept word cloud background
castillodominici
loading...

I know that this sounds overwhelming, especially if you don't have your own IT department to take care of you. It sure seems overwhelming to me.  

Remember. Be skeptical, be vigilant, and if you find that your search on the web is not behaving the way you think it should, end it.

Business, technology, internet and networking concept.
Urupong
loading...

Hackers are using Google.com to deliver malware by bypassing antivirus software. Here's how to stay safe
Weaponized Google OAuth Triggers Malicious WebSocket - c/side
Best antivirus software in 2025 for PC: ranked and reviewed | TechRadar


11 Step Checklist to Safeguard Your Business From Cyber Security Threats

Thanks to In Touch's guest Paul Hacker from Axis Insurance Services, here are 11 things that you can do today for your business to ensure it's cyber security.

Gallery Credit: Conor Walsh


The Most Common Mistakes Made at Airport Security

According to Readers Digest these are the most common mistakes made when going through airport security.

Gallery Credit: Kyle Matthews


 

More From The Quake 102.1