• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google chrome to help users identify untrusted extensions before installation

Google Chrome to Help Users Identify Untrusted Extensions Before Installation

You are here: Home / General Cyber Security News / Google Chrome to Help Users Identify Untrusted Extensions Before Installation
June 4, 2021

Google on Thursday claimed it is really rolling new security attributes to Chrome browser aimed at detecting suspicious downloads and extensions through its Enhanced Protected Searching characteristic, which it released a 12 months back.

To this finish, the look for big mentioned it will now present extra protections when end users try to install a new extension from the Chrome Web Keep, notifying if it can be thought of “reliable.”

Currently, 75% of all add-ons on the system are compliant, the corporation pointed out, adding “any extensions constructed by a developer who follows the Chrome Web Retail outlet Developer Application Insurance policies, will be thought of trusted by Increased Harmless Browsing.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


password auditor

Increased Safe Searching involves sharing genuine-time facts with Google Safe and sound Browsing to proactively safeguard end users versus harmful websites. The firm also noted that its integration with Safe Browsing’s blocklist API served boost privacy and security, with the number of malicious extensions disabled by the browser jumping by 81%.

Also coming to Chrome is a new download safety feature that scans downloaded information for malware by applying metadata about the downloaded file, along with offering people the possibility to mail the file to be scanned for a a lot more in depth analysis.

“If you pick to deliver the file, Chrome will add it to Google Protected Browsing, which will scan it employing its static and dynamic assessment classifiers in actual time,” Google mentioned. “After a brief wait around, if Risk-free Searching establishes the file is unsafe, Chrome will show a warning.”

Inspite of the file being labeled as possibly unsafe, customers nevertheless have the option to open up the file with no scanning. Should really people opt to scan the file, the company claimed the uploaded information are deleted from Risk-free Searching a small time after scanning, but did not specify the precise timeframe for removal.

The new functions are offered beginning with Chrome 91, the model of the browser that was introduced on May perhaps 26. Users can flip on Increased Secure Searching by traveling to Options > Privacy and security > Security > Enhanced safety.

Identified this write-up fascinating? Comply with THN on Fb, Twitter  and LinkedIn to read through additional special material we submit.


Some areas of this short article are sourced from:
thehackernews.com

Previous Post: «supreme court narrows interpretation of cfaa, to the relief of Supreme Court narrows interpretation of CFAA, to the relief of ethical hackers
Next Post: The IT Pro Podcast: Why is it so hard to convict hackers? the it pro podcast: why is it so hard to»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.