Browser Extensions plays a major role in enhancing functionality of Browser and at the same time makes the browser extensions powerful and run it with “high” privileges. As a result, a susceptible or nasty extension may expose your browser as well as system information under threat. In this way the resources of the Browser are at risk, privilege escalation etc. Browser extension can interfere the web applications, even access the files from host file system as well as launch some arbitrary processes. Along with it, an extension would even conspire with various extensions that get installed. And then it can also change preferences as well as share objects. One thing you should keep in mind that the extension developers are not security experts, as a result they wind up by writing some susceptible code. Here you will get to know the attacks that are initiated through Browser extensions.
Thus, this assault would allow 2 nasty extensions in communicating and collaborating with each other and in this way, they can achieve the malevolent objective. The vulnerable points can be identified in the extension development framework such as: Firstly, sharing of object reference, and Secondly the preference overriding. Thus using the proposed attack has illustrated the effectiveness of various attack scenarios. And thus it would provide the details of concept illustration of web domains together with Banking and shopping. It is believed that the circumstances that are used in demonstration by underlining the harshness of accessible attack. In this way it contributes the preliminary framework to address the existing attack.
Once it gets installed, the collusion works in the same way as in Firefox counterpart, apart from some changes in user interface and with better tracking detection, the user who are using Google Chrome would really appreciate it. The map would be totally empty. And while browsing, you will notice that the sites that you are visiting will start appearing on the map, and if you go down tracking the cookies in your system, you will see them in red.
To read more about the site, you can hover over any circles on the map, you can even cross check that whether it is a known tracker. And if the privacy extensions are installed in your computer then you can view only few circles on the map. In any way, you will be able to see a lot of interrelated circles especially if you are visiting any page that contains ads, are associated with social networks, or takes the help of metrics in tracking visitors across the networked sites. It is quite similar to Disqus, which allows you to guide you through these sites, which is a cause of concern. It is a tool that will help you in enhancing your own privacy.