looks like #Chrome is the only browser not supporting Vertical Tabs
looks like #Chrome is the only browser not supporting Vertical Tabs
Using #Linux on my desktop for 21 years, I can't figure out why #Google #Chrome doesn't see my external camera (anymore), only the internal one.
Both are USB devices and all other applications I've tried see both.
Error messages? Traces? Helpful documentation that describes what Chrome actually tries, rather than bland superficial crap for folks who'd be confused by details?
No no no, the UI must be clean. Can't have too much detail.
Such as the details that might actually help.
Argh.
#browser market share 2024/25:
This is serious! #chrome is taking over the internet like #microsoft did the same about 30 years ago with the Internet Explorer.
Thanks to the world wide success of the #apple #iphone and #ipad the #safari browser comes second. The rest is dust. Including #mozilla #firefox.
With #google Chrome winning the browser race they can dictate web techlologies. Keep in mind, that Google is an advertising company in the first place ...
https://gs.statcounter.com/browser-market-share?ref=ghost.iconscout.com
#Development #Launches
Browser MCP · Connect AI apps to your browser to automate tests and tasks https://ilo.im/1637e5
_____
#Automation #Testing #AI #MCP #Browser #Chrome #Extension #OpenSource #WebDev #Frontend
Secret browser monitoring of schoolchildren? Google sued
Google is secretly harvesting data from US schoolchildren and using the data for commercial purposes. This is the accusation made by parents in a lawsuit.
Heimliche Browser-Überwachung von Schulkindern? Google verklagt
Google ernte heimlich Daten von US-Schulkindern und nutze die Daten für kommerzielle Zwecke. Diesen Vorwurf erheben Eltern in einer Klage.
Chrome to patch decades-old flaw that let sites peek at your history – Source: go.theregister.com https://ciso2ciso.com/chrome-to-patch-decades-old-flaw-that-let-sites-peek-at-your-history-source-go-theregister-com/ #rssfeedpostgeneratorecho #TheRegisterSecurity #CyberSecurityNews #TheRegister #Chrome
Jacob Voytko's "War Story" is a fantastic tale on debugging. It's interesting how chrome-only bugs are the toll for browser monoculture. The dream of “it just works” ends the moment it doesn’t, and then it’s your problem. This is what happens when the rendering engine is the platform, one day Math.abs() just... isn’t.
Debugging like this is inherently social. Lone wolfing it won’t cut it. A coworker goes from “I’m busy” to “I’ll clear my schedule” in one breakpoint. Classic.
And man, layered optimization is a trap. V8’s dual-tier pipeline let a broken opcode ship silently. Math.abs() turned into identity in the hot path. Nobody noticed because it mostly worked. Just not always. You gotta love a bug that’s already fixed and still eats two days of your life.
Final fix? One-line Chrome version check and a war-crime-length comment. Sometimes engineering is just knowing where to duct tape.
https://www.clientserver.dev/p/war-story-the-hardest-bug-i-ever
Lazarus Adds New Malicious npm Using Hexadecimal String Encoding to Evade Detection Systems https://gbhackers.com/lazarus-adds-new-malicious-npm-using-hexadecimal-string/ #CyberSecurityNews #cybersecurity #Chrome
New Evasive Campaign Delivers LegionLoader via Fake CAPTCHA & CloudFlare Turnstile
A new malicious campaign has been discovered targeting users searching for PDF documents online. The attack uses fake CAPTCHAs and CloudFlare Turnstile to deliver LegionLoader malware, which then installs a malicious browser extension. The infection chain involves a drive-by download, execution of a VMware-signed application that sideloads a malicious DLL, and use of process hollowing to inject the LegionLoader payload. The browser extension, disguised as 'Save to Google Drive', is installed on Chrome, Edge, Brave and Opera browsers to steal sensitive user data and monitor Bitcoin activities. The campaign has affected over 140 customers, primarily in North America, Asia and Southern Europe, with technology and financial services sectors being the most targeted.
Pulse ID: 67f0e1fafb3df4665f729a46
Pulse Link: https://otx.alienvault.com/pulse/67f0e1fafb3df4665f729a46
Pulse Author: AlienVault
Created: 2025-04-05 07:55:38
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
Pre-AI #Search : filtra i contenuti generati dall'AI su #Google
#filter #ArtificialIntelligence #chrome
https://webappsmagazine.blogspot.com/2025/04/pre-ai-search-filtra-i-contenuti.html
#Firefox has always been behind #Chrome in terms of extension security. And this is probably the first time I'm seeing it leaping ahead.
Scenario: I want the LanguageTool extension to be only activated when I need it, since it's sending my writing to another server & could be spyware.
In Firefox, it now works “only when clicked”, and compared with Chrome, you don't need a page reload. So I could be writing this text here, remember that I need to spellcheck, and just activate it via click.
"I opened this ticket nearly a decade ago when I was building Chrome Extensions. Since then, I've moved to two different states, bought and sold two houses, got married, and had a kid." https://issues.chromium.org/issues/40450316#comment39 #chrome #webdev
New Credit Card Skimming Campaign Uses Browser Extensions to Steal Financial Data https://gbhackers.com/new-credit-card-skimming-campaign-uses-browser-extensions/ #CyberSecurityNews #cybersecurity #Browser #Chrome
Silent Credit Card Thief Uncovered
A sophisticated credit card skimming campaign dubbed 'RolandSkimmer' has been discovered, targeting users in Bulgaria. The attack utilizes malicious browser extensions across Chrome, Edge, and Firefox, initiated through a deceptive LNK file. The malware employs obfuscated scripts to establish persistent access, harvesting and exfiltrating sensitive financial data. The attack workflow involves system reconnaissance, downloading additional malicious files, and injecting scripts into web pages. The threat actor uses unique identifiers to track victims and employs sophisticated techniques to evade detection. The campaign demonstrates the evolving nature of web-based credit card skimming threats, highlighting the need for enhanced security measures against LNK-based attacks and unverified browser extensions.
Pulse ID: 67efc6e92fbd533808f09435
Pulse Link: https://otx.alienvault.com/pulse/67efc6e92fbd533808f09435
Pulse Author: AlienVault
Created: 2025-04-04 11:47:53
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Development #Releases
New to the web platform (March 2025) · The latest browser features at a glance https://ilo.im/1635he
_____
#Browser #Chrome #Firefox #Safari #WebPlatform #WebDev #Frontend #CSS #JavaScript #API
#Google #Chrome "feature" now broken.
I made many #GoogleChrome search engine "bookmarks" for sites I use often. As a keyboardist, I'd create engines with good shortcuts, but the URLs wouldn't use `%s` for the search string. E.g., my work uses #Canvas LMS, so I had a `cnvs` engine with URL `https://org.instructure.com/login/saml`. I'd type `cnvs` in the box, press enter, & away it'd go.
Now engine URLs without `%s` are invalid! I add `%s` to make them work, but now I must type a search string, too!
#Development #Previews
First look at the modern attr() · A new way to use CSS with HTML data attributes https://ilo.im/16357k
_____
#Data #HTML #CSS #InlineCSS #CssGrid #Chrome #Browser #WebDev #Frontend #JavaScript