Researchers discover 14 new XS-Leaks in popular web browsers

With the evolution in technology and the fast paced computer life, one thing which has evolved as well is the way manipulators hack and how people can lose their information without having the slightest bit of idea.

Quite recently another type of hacking has been discovered and it is called XS-Leaks. These leak methods aren’t new, however over time new ways in which this strategy comes to notice,

Recently, the Ruhr-Universität Bochum (RUB) and the Niederrhein University of Applied Sciences discovered almost 14 new types of hacks from these XS-Leaks attacks. The attacks were done on big names like Google Chrome, Safari, Mozilla etc.

So how do these malwares attack a user? Well to start off it mimics the exact coding of the system which enables it to pass through the security walls. Once done, the malicious website starts to steal information from the trusted website and the user doesn’t even know that their data is fleeing off.

The data this malware steals is very crucial. It will gather sensitive information about the user like their data on other applications, their local environment, their locations, their preferences and a lot more.

This malware called XS-Leaks aren’t something new and have been around for a long time. However, every now and then a new innovative form of these malwares pop up and their origin is still unknown.

So how did the researchers differentiated these malwares to be XS-Leaks. Well, to start off the researchers divided the malware into three key ingredients. These were inclusion methods, leak techniques, and detectable differences.

After this division, the researchers found almost 34 leaks to be present currently.

These leaks while have been around evolving and their sole cause still unknown. They still can be stopped.

While the risks can be resolved by the developers, researchers suggest users to deny any kind of suspicious or error messages because they are the sole key for hackers to attack you.

Read next: How Gender Affects Bad Password Choices
Previous Post Next Post