Tagged articles
29 articles
Page 1 of 1
Black & White Path
Black & White Path
Mar 30, 2026 · Information Security

Chrome Users Beware: Google Patches Eight Critical Zero‑Click Vulnerabilities

Google has issued an emergency update that patches eight high‑severity Chrome flaws capable of zero‑click remote hijacking, detailing the red‑team exploitation opportunities, the blue‑team rapid response timeline, the broader Chromium impact, and practical steps users should take to stay protected.

Browser SecurityCVE-2026Chrome
0 likes · 10 min read
Chrome Users Beware: Google Patches Eight Critical Zero‑Click Vulnerabilities
Java Architect Handbook
Java Architect Handbook
Mar 23, 2026 · Frontend Development

Mastering CORS and Cross‑Domain Solutions for Java Interviews

This guide explains the browser same‑origin policy, why cross‑origin restrictions exist, and presents five practical solutions—including CORS, proxy servers, JSONP, postMessage, and WebSocket—along with detailed configuration examples, code snippets, performance tips, and common interview follow‑up questions.

Browser SecurityCORSCross-Origin
0 likes · 13 min read
Mastering CORS and Cross‑Domain Solutions for Java Interviews
Black & White Path
Black & White Path
Mar 3, 2026 · Information Security

How Malicious Chrome Extensions Exploit Gemini AI to Steal Local Files (CVE‑2026‑0628)

The article dissects Chrome’s high‑severity CVE‑2026‑0628 zero‑day, showing how a policy enforcement flaw in the WebView tag lets malicious extensions hijack the privileged Gemini Panel to read local files, capture audio/video, take screenshots, and achieve privilege escalation, and outlines affected versions, risk assessment, and remediation steps.

Browser SecurityCVE-2026-0628Chrome
0 likes · 10 min read
How Malicious Chrome Extensions Exploit Gemini AI to Steal Local Files (CVE‑2026‑0628)
Radish, Keep Going!
Radish, Keep Going!
Oct 2, 2025 · Frontend Development

A Snake Game in the URL Bar: What It Shows About Modern Web Security

This article explores how a quirky snake game runs inside a browser’s address bar, the technical tricks behind it, and how recent security and API changes in modern browsers have turned such creative hacks into fragile experiments, highlighting the tension between innovation and safety.

Browser SecurityJavaScriptURL encoding
0 likes · 11 min read
A Snake Game in the URL Bar: What It Shows About Modern Web Security
Ops Development & AI Practice
Ops Development & AI Practice
Sep 2, 2025 · Information Security

How XSS Bypasses Browser Sandboxes and What You Can Do About It

Even though modern browsers enforce sandboxing and many frameworks add XSS defenses, a successful cross‑site scripting attack can still break through server and browser protections, allowing attackers to hijack sessions, steal data, scan internal networks, exploit browser bugs, or run cryptojacking scripts.

Browser SecurityCSPCryptojacking
0 likes · 9 min read
How XSS Bypasses Browser Sandboxes and What You Can Do About It
Linux Ops Smart Journey
Linux Ops Smart Journey
May 22, 2025 · Information Security

How to Eliminate Browser “Not Secure” Warnings with Self‑Signed Certificates on Windows

This guide explains why browsers show “not secure” warnings, why self‑signed certificates are a cost‑effective solution for small‑to‑medium businesses, and provides step‑by‑step instructions—including MMC configuration and certificate import—to remove those warnings without purchasing commercial SSL certificates.

Browser SecurityHTTPSWindows MMC
0 likes · 5 min read
How to Eliminate Browser “Not Secure” Warnings with Self‑Signed Certificates on Windows
Top Architect
Top Architect
Nov 26, 2024 · Information Security

Understanding Same-Origin Policy and CORS: Core Concepts, Simple Requests, and Preflight Mechanics

This article explains the same‑origin policy, its role in protecting browsers from XSS, CSRF and other attacks, illustrates how origins are defined with protocol, host and port, and details how CORS, simple requests and preflight requests enable controlled cross‑origin communication.

Browser SecurityCross-Origin RequestsSame-Origin Policy
0 likes · 15 min read
Understanding Same-Origin Policy and CORS: Core Concepts, Simple Requests, and Preflight Mechanics
Cognitive Technology Team
Cognitive Technology Team
Nov 11, 2024 · Frontend Development

Why WebAssembly Will Succeed Where Java Applet Failed

The article explains how WebAssembly’s mature community, stronger security sandbox, superior performance, and open‑source governance differentiate it from the outdated Java Applet, positioning Wasm for rapid growth and broader adoption in modern browsers.

Browser SecurityJava AppletWebAssembly
0 likes · 6 min read
Why WebAssembly Will Succeed Where Java Applet Failed
AI Illustrated Series
AI Illustrated Series
Feb 9, 2024 · Information Security

Why Does a POST Sometimes Send Two Requests? A Deep Dive into CORS Preflight

This article explains why browsers may issue a duplicate POST request by exploring the same‑origin policy, the mechanics of CORS, the criteria for simple requests, the structure of preflight OPTIONS requests, credential handling, and how development tools like Webpack Dev Server bypass these restrictions.

Browser SecurityCORSCross-Origin
0 likes · 13 min read
Why Does a POST Sometimes Send Two Requests? A Deep Dive into CORS Preflight
Java Tech Enthusiast
Java Tech Enthusiast
Jan 10, 2024 · Information Security

Cross-Origin Resource Sharing (CORS) and Same-Origin Policy Explained

Cross-Origin Resource Sharing (CORS) extends the Same-Origin Policy by permitting controlled cross‑origin requests through simple and preflight flows, using specific headers and credential rules, thereby balancing web security against threats like XSS, CSRF, and injection attacks while enabling safe resource sharing.

Browser SecurityCORBCORS
0 likes · 10 min read
Cross-Origin Resource Sharing (CORS) and Same-Origin Policy Explained
Architect's Guide
Architect's Guide
Jan 6, 2024 · Information Security

Understanding Same-Origin Policy and CORS in Web Development

This article explains the same‑origin policy, its role in protecting web applications, how browsers enforce it through DOM, web‑data, and network restrictions, and how Cross‑Origin Resource Sharing (CORS) and preflight requests enable controlled cross‑origin communication while maintaining security.

Browser SecurityCORSCross-Origin
0 likes · 12 min read
Understanding Same-Origin Policy and CORS in Web Development
Code Ape Tech Column
Code Ape Tech Column
Sep 28, 2023 · Information Security

Understanding Same-Origin Policy and CORS in Web Development

This article explains the browser's Same-Origin Policy, its impact on DOM, data, and network access, and how Cross-Origin Resource Sharing (CORS) and preflight requests enable controlled cross-origin communication while preserving security.

Browser SecurityCORSCross-Origin Requests
0 likes · 11 min read
Understanding Same-Origin Policy and CORS in Web Development
MaGe Linux Operations
MaGe Linux Operations
Oct 19, 2022 · Information Security

Why Chrome Leads in Browser Vulnerabilities: 2022 Data Reveals the Risks

A 2022 Atlas VPN analysis shows Google Chrome suffered the most reported vulnerabilities among major browsers, with 303 new flaws and a lifetime total of 3,159, while Firefox, Edge, Safari and Opera display varying risk levels and market shares, prompting essential security practices for users.

Browser SecurityChromeFirefox
0 likes · 7 min read
Why Chrome Leads in Browser Vulnerabilities: 2022 Data Reveals the Risks
21CTO
21CTO
Apr 19, 2022 · Information Security

Web Scraping Legalized and Chrome Zero‑Day Patched: Key Tech Updates

Recent developments include a US appellate court affirming that publicly accessible web data can be scraped legally, Google releasing an emergency Chrome 100.0.4896.127 patch for the critical CVE‑2022‑1364 V8 type‑confusion flaw, DB‑Engines’ latest database popularity rankings highlighting Redis’s rise, and Mullvad’s Firefox‑only privacy extension becoming open‑source.

Browser SecurityWeb Scrapingdatabases
0 likes · 6 min read
Web Scraping Legalized and Chrome Zero‑Day Patched: Key Tech Updates
Sohu Tech Products
Sohu Tech Products
Mar 2, 2022 · Information Security

Understanding the Spectre Vulnerability and Browser Mitigations

This article explains the Spectre hardware side‑channel vulnerability, its exploitation via speculative execution and cache timing, demonstrates simple JavaScript attacks, and reviews various browser mitigation strategies such as cache‑control headers, disabling high‑resolution timers, COOP, COEP, and CORB to reduce attack surface.

Browser SecurityMitigationsSpectre
0 likes · 15 min read
Understanding the Spectre Vulnerability and Browser Mitigations
Alibaba Terminal Technology
Alibaba Terminal Technology
Aug 31, 2021 · Frontend Development

Chrome 93 Unveiled: Error Cause, Object.hasOwn, and Key Security Fixes

Chrome 93, released on August 31, 2021, introduces 18 new features including the Error Cause proposal, Object.hasOwn method, port blocking to mitigate ALPACA attacks, removal of 3DES cipher suites, cross‑device WebOTP support, and SVG support in the Clipboard API, all enhancing web development and security.

Browser SecurityChrome 93Clipboard API
0 likes · 14 min read
Chrome 93 Unveiled: Error Cause, Object.hasOwn, and Key Security Fixes
21CTO
21CTO
May 10, 2021 · Operations

What’s Driving the Latest Tech News? From Quantum Computers to Linux LTS Extensions

A tech roundup reveals a former actor turned PhD, exposes a massive Amazon paid‑review fraud, extends Linux 5.10 LTS support to 2026, details Edge’s false Firefox block, showcases Google’s new Chrome media controls, and announces China’s 62‑qubit programmable quantum prototype.

Browser SecurityChromeLinux
0 likes · 7 min read
What’s Driving the Latest Tech News? From Quantum Computers to Linux LTS Extensions
Fulu Network R&D Team
Fulu Network R&D Team
Oct 27, 2020 · Information Security

Understanding Fetch Metadata Request Headers (Sec-Fetch-*) and Their Security Implications

This article explains the purpose, possible values, and security impact of the Sec-Fetch request headers introduced by the Fetch Metadata specification, showing how browsers automatically add them, how servers can use them to filter illegal requests, and providing practical policy examples and code snippets.

Browser SecurityCSRF ProtectionFetch Metadata
0 likes · 9 min read
Understanding Fetch Metadata Request Headers (Sec-Fetch-*) and Their Security Implications
Tencent Cloud Developer
Tencent Cloud Developer
Apr 19, 2018 · Information Security

How Microsoft’s Edge Anti‑Phishing Tech Boosts Chrome’s Security

Microsoft released a Chrome extension called Windows Defender Browser Protection that ports Edge’s SmartScreen anti‑phishing technology to Chrome, showing red warning pages for malicious links and reportedly achieving a 99% phishing detection rate compared with Chrome’s 87% in NSS Labs tests.

Anti‑phishingBrowser SecurityChrome
0 likes · 3 min read
How Microsoft’s Edge Anti‑Phishing Tech Boosts Chrome’s Security
ITPUB
ITPUB
Jan 17, 2018 · Information Security

How ISPs Hijack Video Sites to Run Hidden Crypto‑Mining Scripts

Recent reports show that some Chinese ISPs inject obfuscated cryptocurrency‑mining JavaScript into popular video‑streaming pages, using network hijacking to exploit browsers' CPU cycles without noticeable slowdown, and security tools like 360 Safe Guard now offer anti‑mining protection.

Browser SecurityCoinHiveISP hijacking
0 likes · 6 min read
How ISPs Hijack Video Sites to Run Hidden Crypto‑Mining Scripts
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 17, 2017 · Information Security

Why and How to Encrypt Video Streams for Browser Playback

This article explains why video encryption is essential for paid streaming services, compares anti‑hotlinking and true encryption methods, details the principles of stream‑media encryption, and provides a practical guide to implementing HLS encryption in browsers.

Browser Securityhlssymmetric encryption
0 likes · 11 min read
Why and How to Encrypt Video Streams for Browser Playback
ITPUB
ITPUB
Sep 2, 2016 · Information Security

How Attackers Fake Chrome’s Address Bar to Trick Users in Full‑Screen Phishing

The article explains a new Chrome‑targeted phishing method that uses fullscreen mode and a carefully placed JPEG image to mimic the browser’s address bar and pop‑up dialogs, detailing the technique, visual cues, and security implications for users and researchers.

Browser SecurityChromefull-screen attack
0 likes · 8 min read
How Attackers Fake Chrome’s Address Bar to Trick Users in Full‑Screen Phishing
DevOps
DevOps
Apr 17, 2016 · Information Security

Understanding HTTPS and RSA Encryption Through a Browser Dialogue

This article uses a playful conversation between browsers and a reporter to explain how HTTPS secures web traffic by employing RSA public‑key encryption, digital signatures, certificate authorities, and the challenges of performance and man‑in‑the‑middle attacks, ultimately showing why modern browsers adopted HTTPS by default.

Browser SecurityCertificate AuthorityHTTPS
0 likes · 8 min read
Understanding HTTPS and RSA Encryption Through a Browser Dialogue