DatCom Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
Tip of the Week: Use Admin Accounts to Control You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security User Tips Google Hosted Solutions Hackers Microsoft Tech Term Mobile Devices Backup Malware Internet Business Software Communications Hardware Productivity Data Data Backup Innovation Smartphones VoIP Workplace Tips Email Business Continuity Android Cloud Computing Data Recovery Small Business Smartphone IT Services Managed IT Services Disaster Recovery Ransomware Communication Cybersecurity Router Computer Browser Internet of Things Efficiency IT Support Alert Chrome Outsourced IT Windows 10 Law Enforcement Cybercrime Windows 10 Artificial Intelligence Network Business Management Gadgets Office 365 Money Collaboration Computers Windows Password Miscellaneous How To Applications Server Mobile Device Spam BDR Saving Money Social Media Wi-Fi Managed IT Services Telephone Systems Productivity Information Facebook Passwords Virtualization Word Holiday Flexibility Apps Two-factor Authentication Operating System Data Protection Mobility Government App Vulnerability Social Engineering Avoiding Downtime Settings Mobile Device Management Quick Tips Health Work/Life Balance Keyboard Encryption Phishing Private Cloud Connectivity Voice over Internet Protocol Office Microsoft Office Managed Service BYOD Save Money Data Security Fraud Access Control Public Cloud Office Tips Remote Computing Managed IT Botnet Update Telephone System Telephony Unsupported Software Bring Your Own Device CES Windows 7 Software as a Service Sports Data Breach Data Storage Content Management Google Docs Data Management Automation OneNote Legal Bandwidth Redundancy Employer-Employee Relationship IT Management Comparison Blockchain Identity Theft HaaS Website Servers Infrastructure Paperless Office Scam Networking Entertainment Remote Monitoring Google Drive Human Resources Spam Blocking End of Support Upgrade Machine Learning VPN IT Plan Business Intelligence Virtual Assistant Devices Unified Threat Management Network Congestion Screen Mirroring Enterprise Content Management Display Windows 10s Windows Server 2008 Internet exploMicrosoft MSP Root Cause Analysis Cleaning Business Mangement YouTube Help Desk Hacking HBO Supercomputer Online Accountants Google Search FENG Budget Cortana Wireless Wire Mouse Conferencing Worker Commute Millennials Hiring/Firing Amazon Authentication Users Hybrid Cloud Thought Leadership Mobile Computing IT Consultant Battery Cast Multi-Factor Security Password Management Security Cameras Scalability File Sharing Black Market Music Computer Care WiFi Gmail Company Culture Automobile Outlook Telecommuting Proactive IT Search Skype Travel Google Apps Administrator Emails Software Tips Workforce Digital Signature Risk Management Amazon Web Services Nanotechnology Information Technology Camera Leadership Education Firewall Trending NIST Hacker Solid State Drive Content Flash Remote Work Practices Augmented Reality Meetings Wearable Technology Recycling Managing Stress Shortcuts Frequently Asked Questions How to Start Menu Training Workers Smart Office Microchip Document Management Patch Management Net Neutrality PDF Politics Online Shopping Smart Tech Addiction Computing Infrastructure Cryptocurrency Smartwatch Audit Audiobook Current Events Hosted Computing Advertising Remote Worker USB Samsung eWaste Social Video Games Excel Internet Exlporer Recovery Tools Search Engine Best Practice Save Time Physical Security FCC Instant Messaging Computer Fan Sync Evernote Cache Warranty History Big Data Specifications Apple Safe Mode Employee Electronic Medical Records Credit Cards Inventory Wiring IT Support Knowledge Data loss Value Criminal HVAC Vendor Tip of the week Downtime Experience Charger Password Manager Bing Netflix IBM Title II Digital Signage The Internet of Things HIPAA Wireless Charging Marketing Wireless Internet Printer webinar Virtual Reality Staff iPhone Techology Loyalty Safety Wireless Technology Benefits Worker Managed Service Provider Hosted Solution SaaS Smart Technology Compliance Rootkit Business Owner Emergency Employer Employee Relationship Twitter Two Factor Authentication Regulation ISP Webinar Computer Accessories Printers Content Filtering Assessment CrashOverride Vendor Management IT solutions Bluetooth Television Troubleshooting Shadow IT Transportation Books Public Computer