Technology ❯ Software ❯ Browser Extensions ❯ Malicious Software
A proof-of-concept using malicious extensions to intercept WebAuthn calls highlights the need for tighter browser controls.