Almost every internet user faces a situation of accidentally clicking on an ad and the browser takes you to another page that cannot be abandoned even though repeatedly pressing the & # 39; back & # 39; button. This is a method that is widely used by malicious sites that have been widely discussed on the Internet.
Google employees have known this decision for two years and tried to solve it. So far, they have sent three patches for the Chromium project, which in turn aims to eliminate vulnerability. Chromium is an open source browser, with some of the code used in making Google Chrome and Opera.
How are vulnerabilities realized?
Vulnerability manifests itself with a system notification that warns of malicious software with the message "Internet Security Warning! Code: 055BCCAC9FEC". This is activated when a user accesses a fake website. Once there, even if the & # 39; button returns & # 39; clicked, the same page is reloaded after the site is embedded in the browser history with a link that leads to the same page, thus trapping users in a circle, informing the ZDNet portal.
The problem can reappear even after closing Chrome through the Windows task manager, because when you reopen the browser you can recover automaticallynasty webpage.
To leave the page, some users even use technical support. Here is another danger waiting: these pages may contain fake technical support data, where scammers can try to get Credit card information or persuade users to give them remote access to your computer.