It’s part of an effort to stamp out software designed to disrupt browsers.
Upon clicking the ‘Review’ button, users will be directed to their extensions list.
“Malicious malware can potentially steal information from the user,” he added.

Hacker.boonchai wedmakawand / Getty Images
Google recently identified and removedfrom its web store 32 extensionswith 75 million installs.
“These extensions are being used everywhere,” Zorio said.
It’s hard to measure the full scope of the malicious web client extension problem, Williams said.

Cybersecurity system warning.Teera Konakan / Getty Images
“Malicious web app extensions targeting cryptocurrency were very impactful in recent years,” he added.
“Fake password managers also have been particularly problematic.”
Never download them from random sites or third-party marketplaces, Nachreiner recommended.
Also, attempt to stick to well-reviewed, well-known, and verified extensions.
“If you find you are not using an extension you have, delete it.
Also, pay close attention to the permissions you give an extension when you install it.
Yes, even legitimate extensions will sometimes need significant permission to install.
Another often-heard tip is to use some sort of antivirus or malware protection software.
Update 08/25/2023: Corrected a statement in Paragraph 10 at the source’s request.
Update 9/11/2023:Added a job title at the request of the source.