After the Epic vs. Apple ruling, mobile game monetization takes a leap forward

In this GB Spotlight experts from Reaktor + FastSpring discuss the Apple v Epic ruling and what it means for direct to consumer monetizationRead More
Google is hosting dozens of extensions in its Chrome Web Store that perform suspicious actions on the more than 4 million devices that have installed them and that their developers have taken pains to carefully conceal.
The extensions, which so far number at least 35, use the same code patterns, connect to some of the same servers, and require the same list of sensitive systems permissions, including the ability to interact with web traffic on all URLs visited, access cookies, manage browser tabs, and execute scripts. In more detail, the permissions are:
These sorts of permissions give extensions the ability to do all sorts of potentially abusive things and, as such, should be judiciously granted only to trusted extensions that canβt perform core functions without them.
Β© Getty Images