DatCom Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
Tip of the Week: Use Admin Accounts to Control You...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, December 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Hackers Microsoft Business Computing Hosted Solutions User Tips Internet Business Software Tech Term Google Malware Data Backup Hardware Innovation Backup Mobile Devices Email Smartphones Data Data Recovery Small Business VoIP Android Communications Workplace Tips Business Continuity Computer Ransomware Smartphone Managed IT Services Cloud Computing Law Enforcement Disaster Recovery Windows 10 IT Services Cybersecurity Browser Communication Alert Network Chrome Outsourced IT Cybercrime Computers How To Password Applications Artificial Intelligence Business Management Office 365 Efficiency Money Collaboration IT Support Internet of Things Server Router Windows Windows 10 Miscellaneous Productivity Saving Money Social Media Virtualization Information Word Productivity Facebook Passwords BDR Spam Gadgets Managed IT Services Telephone Systems Keyboard Phishing Microsoft Office BYOD Mobile Device Save Money Holiday Quick Tips Data Security Connectivity Flexibility Apps Voice over Internet Protocol Managed Service Office Mobility Two-factor Authentication Vulnerability Data Protection Social Engineering Avoiding Downtime Wi-Fi Operating System Government App Mobile Device Management Work/Life Balance Scam Networking Entertainment Remote Monitoring Comparison Blockchain Identity Theft Google Drive Website Servers Infrastructure Paperless Office Spam Blocking Encryption Human Resources Health IT Plan Remote Computing Managed IT Upgrade VPN Virtual Assistant Business Intelligence Bring Your Own Device Fraud Unsupported Software Private Cloud Telephony End of Support Update Windows 7 Telephone System Data Breach Office Tips Public Cloud CES Data Storage Software as a Service Data Management Sports Settings Legal Bandwidth Content Management OneNote Employer-Employee Relationship IT Management HaaS Google Docs Redundancy Recovery Workers Smart Office Microchip Excel Best Practice Net Neutrality PDF Instant Messaging Online Shopping Smart Tech Addiction Physical Security History Information Technology Big Data Cryptocurrency Tools Electronic Medical Records Hosted Computing Remote Worker IT Support eWaste Value Computer Fan Sync Knowledge Data loss Automation Experience Charger Search Engine Tip of the week FCC IBM HIPAA Evernote Cache Netflix Warranty Virtual Reality Specifications Safe Mode Downtime Credit Cards Inventory webinar Wiring Advertising Criminal HVAC The Internet of Things Network Congestion Screen Mirroring Internet Exlporer Password Manager Cleaning Machine Learning Windows 10s Bing Windows Server 2008 Hacking Title II Supercomputer Root Cause Analysis Botnet Apple Budget Wireless Charging Wireless Internet Printer HBO Worker Commute Staff Hiring/Firing Access Control Devices Conferencing Unified Threat Management Battery Enterprise Content Management FENG Scalability Accountants IT Consultant MSP Cast Black Market Music Business Mangement Computer Care YouTube Help Desk Automobile Online Search iPhone Techology Cortana Wire Mouse Outlook Marketing Millennials Risk Management Amazon Authentication Thought Leadership Emails Mobile Computing Software Tips Education Multi-Factor Security Firewall Password Management Skype Content Telecommuting Leadership File Sharing Internet exploMicrosoft WiFi Wearable Technology Gmail Company Culture Solid State Drive Flash Meetings How to Travel Google Apps Training Administrator Frequently Asked Questions Document Management Wireless Workforce Patch Management Digital Signature Audiobook Politics Amazon Web Services Nanotechnology Camera Computing Infrastructure Users Hybrid Cloud Trending NIST Start Menu Remote Work Practices Current Events Augmented Reality USB Recycling Samsung Managing Stress Audit Shortcuts Video Games Regulation Vendor Management Save Time Bluetooth IT solutions Printers Television CrashOverride Troubleshooting Shadow IT Transportation Books Public Computer Loyalty Wireless Technology Benefits Worker Hosted Solution SaaS Smart Technology Rootkit Business Owner Emergency Safety Employer Employee Relationship Two Factor Authentication Compliance Managed Service Provider Computer Accessories Twitter Webinar Content Filtering Assessment