Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LinkedIn’s Secret Browser Extension Scan Sparks Privacy Concerns

LinkedIn’s Secret Browser Extension Scan Sparks Privacy Concerns

Posted on April 4, 2026 By CWS

A recent investigation has unveiled that LinkedIn, the prominent professional networking platform owned by Microsoft, is covertly scanning users’ browsers for installed extensions without their knowledge. This activity, discovered by the advocacy group Fairlinked e.V. under the campaign ‘BrowserGate,’ has raised significant privacy concerns among LinkedIn’s one billion users.

Uncovering the Hidden Code

The investigation revealed that LinkedIn’s JavaScript code silently scans for browser extensions every time a user accesses the site via Chrome-based browsers. This process, which identifies extensions by attempting to access certain files, operates without any visible signs to the user. The information collected is then encrypted and sent back to LinkedIn’s servers, as well as to external entities.

Implications of Covert Scanning

A significant aspect of this hidden surveillance is its potential impact on user privacy. As LinkedIn profiles are linked to real identities and workplaces, the data gathered provides detailed insights into users’ software preferences. This includes extensions related to job searches, religious beliefs, political views, and more. Such data, categorized as Special Category Data under GDPR, should not be processed without explicit consent, which LinkedIn currently lacks.

Wider Surveillance Network

Beyond LinkedIn’s servers, the BrowserGate investigation highlighted additional tracking elements from HUMAN Security, a cybersecurity firm known for its technology embedded in numerous websites. This element, along with scripts from LinkedIn and Google, collects data to create comprehensive device profiles of users, all without disclosure or consent.

LinkedIn has reportedly utilized this data to target users of competing services, even expanding its scan list from 461 products in 2024 to over 6,000 by early 2026. Legal actions are being considered as the practice is deemed illegal across various jurisdictions.

Steps for User Protection

Concerned users can take several measures to safeguard their privacy: utilizing Firefox or Safari for LinkedIn access, creating a dedicated Chrome profile with no extensions, or employing the Brave browser with fingerprinting protection. Additionally, users can review their browser extensions against BrowserGate’s public database.

As legal proceedings develop, LinkedIn users on Chromium browsers remain subject to this ongoing surveillance. Stay informed by following updates on Google News and other platforms.

Cyber Security News Tags:browser extensions, BrowserGate, Chrome, data breach, data security, Fairlinked, GDPR, HUMAN Security, LinkedIn, Privacy

Post navigation

Previous Post: Anthropic Ends Third-Party Tool Access for Claude
Next Post: Top User Access Management Tools for 2026

Related Posts

Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries Cyber Security News
North Korean Phishing Campaign Exploits GitHub as C2 Tool North Korean Phishing Campaign Exploits GitHub as C2 Tool Cyber Security News
Here’s How to Solve It  Here’s How to Solve It  Cyber Security News
EY’s 4TB SQL Server Backup File On Microsoft Azure Exposed Publically EY’s 4TB SQL Server Backup File On Microsoft Azure Exposed Publically Cyber Security News
Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top VPNs for Chrome in 2026: Secure Your Browsing
  • Top User Access Management Tools for 2026
  • LinkedIn’s Secret Browser Extension Scan Sparks Privacy Concerns
  • Anthropic Ends Third-Party Tool Access for Claude
  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top VPNs for Chrome in 2026: Secure Your Browsing
  • Top User Access Management Tools for 2026
  • LinkedIn’s Secret Browser Extension Scan Sparks Privacy Concerns
  • Anthropic Ends Third-Party Tool Access for Claude
  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark