a crackdown on intrusive pop-up advertisements on its Chrome web browser after a previous update failedVulnerability-related.PatchVulnerabilityto stop them . The ads open users up to phishing attacksAttack.Phishingthat attempt to scamAttack.Phishingpeople into giving private information such as bank details to online fraudsters . Google says the ads create an 'abusive experience for users ' , including fee messages , unexpected clicks , phishing attemptsAttack.Phishingand misleading site behaviour . The firm tried to stopVulnerability-related.PatchVulnerabilitymanipulative adverts in an update last February but now admits that it 'did not go far enough ' . Chrome currently has an option to enable a pop-up blocker but fraudsters have quickly found ways around this . The company declined to name the companies involved in the crackdown but said that the update will blockVulnerability-related.PatchVulnerabilityads from a 'small number of sites with persistent abusive problems ' . Pop-ups are small windows that tend to show system warnings which are difficult to close , as well as 'watch video ' buttons . When the company announced its previous crackdown back in February , critics were quick to point out that the firm wanted to make ads more tolerable - so that their own could get past filters . Some said that the aim was to persuade people to disable their ad block so as not to deprive publishers ( including Google ) from displaying their advertisements and thus depriving them of revenue . Although they did not go into detail about why the previous block did n't work , Chrome product manager Vivek Sekhar said : 'We 've learned since then that this approach did not go far enough . ' 'In fact , more than half of these abusive experiences are not blocked by our current set of protections , and nearly all involve harmful or misleading ads . ' Advertisements also tend to be a hotbed for malicious software or scams where fraudsters trickAttack.Phishingpeople into giving out their personal information . Once a pop-up is clicked on , the ad can take you to a separate web page asking you to download an application and actually triggers an onslaught of more pop-up ads
Millions of student , staff and faculty email addresses and passwords from 300 of the largest universities in the United States have been stolenAttack.Databreachand are being circulated by cyber criminals on the dark web , according to a recent report . Hacktivists , scam artists and even terrorists intend to sell , trade or just give away the addresses and passwords , said the Digital Citizens Alliance report . During eight years of scanning the dark web—the portion of the Internet not indexed for open searches , where criminals covertly operate—researchers from the security firm ID Agent discovered nearly 14 million addresses and passwords belonging to faculty , staff , students and alumni available to cyber criminals . Of those , 79 percent of the credentials were placed there within the last year . The nonprofit Digital Citizens Alliance , based in Washington , D.C. , wanted to demonstrate in its recent report the scale and complexity of the problem facing large organizations that try to protect email users . `` Higher education institutions have deployed resources and talent to make university communities safer , but highly skilled and opportunistic cyber criminals make it a challenge to protect large groups of highly desirable digital targets , '' the group 's Deputy Executive Director , Adam Benson , says in a statement . `` We shared this information from cybersecurity researchers to create more awareness of just what kinds of things threat actors are capable of doing with a .edu account . '' ID Agent noted that large Midwestern institutions appear to be the most vulnerable , although it is not clear why they are targets . Topping the list is the University of Michigan , with 122,556 email addresses found on the dark web , followed by Penn State University , the University of Minnesota , Michigan State University , Ohio State University and the University of Illinois . `` Cyber criminals are motivated to be successful , so it 's not surprising to see a significant number of stolen .edu accounts attributed to large and prestigious technical schools , '' Brian Dunn , ID Agent 's managing partner , says in a statement . Criminals and hacktivists can use the fake emails to scamAttack.Phishingothers or take advantage of discounts offered to students and faculty on products such as software . Higher education institutions have taken steps to beef up their cybersecurity postures , especially after the Research and Education Networking Information Sharing and Analysis Center last year alerted officials to compromised credentials . `` Universities are aware of the reuse problem and have worked hard to educate members of the university community how to protect themselves , '' according to the Digital Citizens Alliance . `` We saw examples of pages on [ university-operated ] websites explaining how to create effective passphrases and use two-factor authentication . ''