Skip to content
  Thursday 15 May 2025
  • Home
  • Attack
  • Malware
  • Cloud
  • Data
  • Technology
  • World of tech
Trending
January 16, 2025Goldman Sachs CEO Solomon says IPO market is ‘going to pick up’ along with dealmaking February 11, 2025The Fallout on AI Chipmakers, Infrastructure From DeepSeek August 28, 2023Why a Wiz-SentinelOne Deal Makes Sense, and Why It Might Not September 26, 2023Practical Strategies for a Simplified and Secured Cloud JourneyWebinar. July 31, 2024Live Webinar | Modernize Identity and Security to Adopt a Zero Trust StrategyWebinar. July 27, 2023Intel jumps 7% as it returns to profitability after two quarters of losses October 5, 2024Why WordPress founder Matt Mullenweg has gone ‘nuclear’ against tech investing giant Silver Lake November 22, 2023LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In February 12, 2024Why Are Compromised Identities the Nightmare to IR Speed and Efficiency? September 27, 2024How to Spot North Korean IT Workers
  • Home
  • Attack
  • Malware
  • Cloud
  • Data
  • Technology
  • World of tech
  Attack  Google Chrome’s New Feature Alerts Users About Auto-Removal of Malicious Extensions
Attack

Google Chrome’s New Feature Alerts Users About Auto-Removal of Malicious Extensions

adminadmin—August 18, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


Aug 18, 2023THNBrowser Security / Malware

Auto-Removal of Malicious Extensions

Google has announced plans to add a new feature in the upcoming version of its Chrome web browser to alert users when an extension they have installed has been removed from the Chrome Web Store.

The feature, set for release alongside Chrome 117, allows users to be notified when an add-on has been unpublished by a developer, taken down for violating Chrome Web Store policy, or marked as malware.

The tech giant said it intends to highlight such extensions under a “Safety check” category in the “Privacy and security” section of the browser settings page.

“When a user clicks ‘Review,’ they will be taken to their extensions and given the choice to either remove the extension or hide the warning if they wish to keep the extension installed,” Oliver Dunk, a developer relations engineer for Chrome extensions, said.

Cybersecurity
More stories

Reimagining Network Pentesting With Automation

December 15, 2023

CISA and FDA Warn of Critical Backdoor in Contec CMS8000 Patient Monitors

January 31, 2025

Introducing our End-to-End OS Platform

December 18, 2024

Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses

April 10, 2024

“As in previous versions of Chrome, extensions marked as malware are automatically disabled.”

The development comes as the company said it’s going to automatically upgrade all https:// URL navigations to https:// even when users click on a link that explicitly declares https://. The feature is currently being tested in Chrome 115, and is expected to be rolled out soon.

Google also said it will also show a warning starting in mid-September 2023 when users attempt to download high-risk files while on an insecure connection.

“Downloaded files can contain malicious code that bypasses Chrome’s sandbox and other protections, so a network attacker has a unique opportunity to compromise your computer when insecure downloads happen,” the Chromium team said.

Cybersecurity

“Unless HTTPS-First Mode is enabled, Chrome will not show warnings when insecurely downloading files like images, audio, or video, as these file types are relatively safe.”

Some of the other features that are in the pipeline include enabling HTTPS-First Mode by default in Incognito Mode for a more secure browsing experience and automatically turning the setting on for users who rarely use HTTP.

Users can enable HTTPS-First Mode by enabling “Always use secure connections” in Chrome security settings (chrome://settings/security).

The updates also follow Google’s proposals to add support for quantum-resistant encryption algorithms in the Chrome browser, starting with version 116.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

admin

Inside the Rise of ‘Dark’ AI Tools
New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools
Related posts
  • Related posts
  • More from author
Attack

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

May 14, 20250
Attack

Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

May 14, 20250
Attack

Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering

May 14, 20250
Load more

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Malware

CISA Cancels $2.4 Billion Cybersecurity Procurement

May 14, 20250
Malware

RFK Jr to Lean on AI to Bolster Cyber, Health IT at Agencies

May 14, 20250
Malware

North Korea’s Hidden IT Workforce Exposed in New Report

May 14, 20250
Malware

Live Webinar | From Pilot to Production: Bringing AI to Work in Financial Services OperationsWebinar.

May 14, 20250
Malware

Meta Faces More European Legal Hurdles Over AI Data Training

May 14, 20250
Attack

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

May 14, 20250
Load more

Recent Posts

  • CISA Cancels $2.4 Billion Cybersecurity Procurement
  • RFK Jr to Lean on AI to Bolster Cyber, Health IT at Agencies
  • North Korea’s Hidden IT Workforce Exposed in New Report
  • Live Webinar | From Pilot to Production: Bringing AI to Work in Financial Services OperationsWebinar.
  • Meta Faces More European Legal Hurdles Over AI Data Training

    © 2022
    • Home
    • Attack
    • Cloud
    • Data
    • Malware
    • Technology
    • World of tech
    • Privacy
    • Contact