• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google chrome's new feature alerts users about auto removal of malicious

Google Chrome’s New Feature Alerts Users About Auto-Removal of Malicious Extensions

You are here: Home / General Cyber Security News / Google Chrome’s New Feature Alerts Users About Auto-Removal of Malicious Extensions
August 18, 2023

Google has declared plans to increase a new element in the future version of its Chrome web browser to alert consumers when an extension they have put in has been removed from the Chrome Web Store.

The characteristic, set for release together with Chrome 117, allows consumers to be notified when an incorporate-on has been unpublished by a developer, taken down for violating Chrome Web Store plan, or marked as malware.

The tech big stated it intends to highlight these types of extensions under a “Basic safety test” class in the “Privacy and security” part of the browser configurations web site.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“When a consumer clicks ‘Review,’ they will be taken to their extensions and given the preference to both take out the extension or hide the warning if they wish to keep the extension installed,” Oliver Dunk, a developer relations engineer for Chrome extensions, said.

Cybersecurity

“As in preceding variations of Chrome, extensions marked as malware are mechanically disabled.”

The growth arrives as the enterprise said it is likely to immediately enhance all https:// URL navigations to https:// even when users click on on a website link that explicitly declares https://. The characteristic is at present staying examined in Chrome 115, and is expected to be rolled out quickly.

Google also mentioned it will also present a warning starting off in mid-September 2023 when users endeavor to download superior-risk data files when on an insecure link.

“Downloaded data files can consist of destructive code that bypasses Chrome’s sandbox and other protections, so a network attacker has a exceptional option to compromise your laptop when insecure downloads materialize,” the Chromium workforce reported.

Cybersecurity

“Until HTTPS-Very first Method is enabled, Chrome will not demonstrate warnings when insecurely downloading data files like photographs, audio, or movie, as these file varieties are rather safe.”

Some of the other features that are in the pipeline incorporate enabling HTTPS-1st Method by default in Incognito Manner for a additional protected browsing practical experience and mechanically turning the setting on for customers who seldom use HTTP.

End users can empower HTTPS-Initial Mode by enabling “Constantly use secure connections” in Chrome security settings (chrome://options/security).

The updates also abide by Google’s proposals to increase help for quantum-resistant encryption algorithms in the Chrome browser, beginning with edition 116.

Discovered this posting exciting? Abide by us on Twitter  and LinkedIn to read more special material we write-up.


Some sections of this posting are sourced from:
thehackernews.com

Previous Post: «nofilter attack: sneaky privilege escalation method bypasses windows security NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security
Next Post: New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools new blackcat ransomware variant adopts advanced impacket and remcom tools»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.