By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Passkeys Are Exploding, AI Is Leaking Your Business Data, and a New Bug Is Crashing Chromium Browsers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Passkeys Are Exploding, AI Is Leaking Your Business Data, and a New Bug Is Crashing Chromium Browsers
News

Passkeys Are Exploding, AI Is Leaking Your Business Data, and a New Bug Is Crashing Chromium Browsers

News Room
Last updated: 2025/11/02 at 3:49 PM
News Room Published 2 November 2025
Share
Passkeys Are Exploding, AI Is Leaking Your Business Data, and a New Bug Is Crashing Chromium Browsers
SHARE

Passkeys have a lot of benefits over passwords, to be sure, but in recent years, getting people to adopt them has been a slow process. That may be changing, however. We reported this week on a new study from security firm Dashlane, which found that more people are embracing passwords, especially on platforms encouraging their use. 

Leading the pack of companies pressuring their users to adopt passkeys are Amazon, which you may have noticed almost always asks you to create one when you visit the site; Google, which has also been providing users with multiple methods to secure their accounts; and Microsoft, which made passkeys the default login option for new accounts. There’s a reason that retail and payment companies are also pushing passkeys: Issues like forgotten passwords, late SMS messages, and other tech troubles could cost them money in the form of abandoned carts and delayed purchases. And, as we’ll see later in the story roundup, most data on the dark web comes from retail services. 

Speaking of passkeys, using them is a snap when you also use a password manager. When testing password managers, we especially appreciate those providing inheritance options, which allow your loved ones to access your passwords and online accounts in an emergency. Unfortunately, those inheritance options can turn into a security nightmare when exploited, as we reported earlier this week when it happened to LastPass. Hackers launched a campaign to trick LastPass account holders into entering their account information on a phishing site, with some even going so far as to call users posing as LastPass employees to obtain their credentials. 

And since we’re talking about sensitive information on the web, this week we covered a new study that revealed that unauthorized AI use at work has exploded. The result is that sensitive corporate information has also exploded onto the clear web, thanks to it being absorbed by and republished by AI companies that often have no idea they’re hosting confidential information. Seriously—one quick web search and you can find several examples of financial reports, documents marked “internal use only,” entire manuscripts, and more. 


See the Business Data Leaking Onto the Dark Web With Proton’s Data Breach Observatory

Proton, the security company behind products like Proton VPN, Proton Pass, and Proton Mail, just introduced a new service designed to alert the public to corporate data breaches when they occur, even if the company in question would rather not make a public statement about it. The Proton Data Breach Observatory is a comprehensive and regularly updated list of data breaches, including the date of the breach, the types of data compromised, and the severity of the issue. 

In a statement, Proton said that because data breaches have become so common, only the most significant ones receive media attention, which can leave people with a false perception of security. The platform is based on the same kind of dark web monitoring and research that the company already conducts, but assembled in a digestible format for both security professionals and individual users alike. That means the tool doesn’t rely on self-reporting; it comes directly from where the data lives, on the dark web. Currently, nearly 800 breaches are on the site, with most sensitive data consisting of names, email addresses, and other contact details, followed by passwords. As for targets, the available data primarily comes from retail businesses. All of this is a reminder to practice good internet hygiene. 

Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates


SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!


This Security Hole Can Crash Billions of Chromium Browsers, and Google Hasn’t Patched It Yet

Odds are you’re reading this using a web browser based on Chromium. That’s Google’s architecture for browsers, and at this point, the vast majority of the web has been built around the assumption that you’ll be using one. Chromium browsers include Chrome, obviously, but also Microsoft’s Edge, Brave, Vivaldi, and OpenAI’s newly released (and problematic, as we discussed last week) Atlas browser. Unfortunately, as The Register reports, independent security researcher Jose Pino discovered a flaw in Blink, the rendering engine used by Chromium browsers, that, when exploited, can cause the browser to freeze within seconds, and in some cases freeze the host system as well by sucking down all available memory. 

Recommended by Our Editors

The Register’s full story explains in detail how the exploit works and what happened when they tested it (spoiler: it’s bad). However, it’s worth noting that they contacted the developers of nine different Chromium-based browsers. Seven didn’t respond. The developers of Brave said that, because it’s an issue with Chromium, they would implement a fix as soon as Google had one. Google, for its part, said it’s looking into it. Luckily, other rendering engines were immune to the issue, including Gecko (used in Firefox) and WebKit (used in Safari). 


Cybersecurity Firms See Surge in AI-Powered Attacks Across Africa

Among the many social consequences of AI that we have yet to fully reckon with is the rapid proliferation of generative AI-powered scams, a trend we’ve been reporting on since the beginning of the year. And as Dark Reading reports, before the scams reach you and me, scammers test their tactics on regions of the world that lack the same consumer protections and cybersecurity infrastructure available to us. 

In this case, Dark Reading notes that scammers are using AI to set up entire scam “hubs,” where scammers utilize generative AI tools in the same way anyone would use business software. Except at these jobs, the goal is to create deepfakes and phishing messages that are culturally appropriate in context, thereby removing one more way victims can discern that the sender (or even the caller) isn’t who they claim to be. Right now, the attacks are also centered on African institutions, where the scam hubs are also based. But experts all agree that it’s more of a proving ground. As AI-powered impersonation and phishing attacks become more effective, they’ll get more popular—which means they’re coming for everyone, everywhere.

About Our Expert

Alan Henry

Alan Henry

Managing Editor, Security


Experience

I’ve been writing and editing stories for almost two decades that help people use technology and productivity techniques to work better, live better, and protect their privacy and personal data. As managing editor of PCMag’s security team, it’s my responsibility to ensure that our product advice is evidence-based, lab-tested, and serves our readers.

I’ve been a technology journalist for close to 20 years, and I got my start freelancing here at PCMag before beginning a career that would lead me to become editor-in-chief of Lifehacker, a senior editor at The New York Times, and director of special projects at WIRED. I’m back at PCMag to lead our security team and renew my commitment to service journalism. I’m the author of Seen, Heard, and Paid: The New Work Rules for the Marginalized, a career and productivity book to help people of marginalized groups succeed in the workplace.

Read Full Bio

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Stem Cell Research Discovers Two Cells That Could Lead To Regenerating Teeth And Bone – BGR Stem Cell Research Discovers Two Cells That Could Lead To Regenerating Teeth And Bone – BGR
Next Article Rackmount & add PCI-E to your M4 Mac mini with new Sonnet enclosures Rackmount & add PCI-E to your M4 Mac mini with new Sonnet enclosures
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

7 of Our Favorite A24 Movies Are Now Streaming for Free
7 of Our Favorite A24 Movies Are Now Streaming for Free
News
101 gadgets: Stuff’s pick of brilliant photography tech from 2025 | Stuff
101 gadgets: Stuff’s pick of brilliant photography tech from 2025 | Stuff
Gadget
Build Native-Like Bottom Sheets with CSS Scroll Snap  | HackerNoon
Build Native-Like Bottom Sheets with CSS Scroll Snap | HackerNoon
Computing
SpaceX Moves to Block Third-Party Starlink Sales in Unauthorized Markets
SpaceX Moves to Block Third-Party Starlink Sales in Unauthorized Markets
News

You Might also Like

7 of Our Favorite A24 Movies Are Now Streaming for Free
News

7 of Our Favorite A24 Movies Are Now Streaming for Free

8 Min Read
SpaceX Moves to Block Third-Party Starlink Sales in Unauthorized Markets
News

SpaceX Moves to Block Third-Party Starlink Sales in Unauthorized Markets

6 Min Read
Best robot vacuum deal: Save 0 on Shark AI Ultra
News

Best robot vacuum deal: Save $300 on Shark AI Ultra

2 Min Read

Microsoft to ship 60,000 Nvidia AI chips to UAE under US-approved deal

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?