k_Street Consulting, LLC Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Entrepreneur Professional Services File Versioning Trending Archive Utility Computing Nanotechnology Recovery Keyboard Workforce Logistics Mobile Device Value Office Tips Social Media How to Security Transportation Webinar WiFi Computer Accessories Video Games Safe Mode Windows Administration Mobile Device Management Computers Skype Software Tips Conferencing History Warranty Smart Technology Computer Cryptocurrency Audiobook Tools BDR Network Security Smartphone Two-factor Authentication Files Domains Criminal Communication Cache Business Technology Computer Fan Tip of the week Smartphones Recycling MSP Twitter Theft Save Time HVAC Tech Term Data Recovery Software Worker Google Drive Streaming Media Going Green Administrator Monitor Android SharePoint Uninterrupted Power Supply Internet of Things Automobile Compliance Hackers Devices Productivity Distributed Denial of Service Encryption Content Management ISP Firewall Statistics Sync User Tips DDoS Holiday Application App Addiction Document Management Telephony Comparison OneNote Tip of the Week eCommerce Remote Monitoring Fiber-Optic Maintenance Project Management Servers Bring Your Own Device Information Technology Evernote File Sharing Password Security Cameras Google Docs Downtime Safety Phishing Root Cause Analysis Virtual Reality User Error Public Cloud Hacking Samsung Network Electronic Health Records Bandwidth Electronic Medical Records Windows 8 Point of Sale VoIP Printer Server Mobile Office Laptop Touchscreen malware Windows 10 Hacker Managed IT Website Facebook Innovation IT Support Black Market communications Passwords Loyalty Ransomware Backup Chrome Remote Monitoring and Maintenance Credit Cards Thank You Books Shadow IT Database Microsoft Office IaaS Assessment Screen Mirroring Amazon Web Services IoT Lithium-ion battery travel IT Plan Save Money Settings Social Engineering Technology Restore Data Information Spam VPN Budget Saving Money Business Continuity Two Factor Authentication Hard Drives Router Applications Best Practices Best Practice Mobile Devices Cryptomining IT Support Scam Business Tablets Colocation Access Control Fraud Operating Systems Risk Management Flexibility Managed Service Provider Experience Internet exploMicrosoft Vendor Management Software as a Service Millennials Virtualization Specifications Bing IBM HIPAA Audit Biometrics Data Environment Customer Relationship Management Search Start Menu Wireless Hosted Computing Remote Worker Wire IT Services Mobile Infrastructure Automation Spam Blocking Cybercrime GDPR Google Apps Windows Server 2008 Big data Advertising Unsupported Software Thought Leadership Scalability Relocation WIndows 7 Employer-Employee Relationship Current Events Camera Miscellaneous iphone Humor LinkedIn Update Hardware Efficiency Shortcut Data Storage Data loss Digital Signage Artificial Intelligence Social Networking Networking Money Memory Employee/Employer Relationship Saving Time Business Management Tech Support IT solutions Troubleshooting Techology Online Currency Emails Gadgets Wireless Internet Proactive IT Excel Telephone System Entertainment Television Content Filtering Botnet Multiple Versions Supercomputer Regulation Content Telephone Systems Hiring/Firing Knowledge Office 365 Remote Computing Public Computer Computer Repair Net Neutrality Smart Tech HaaS Printer FENG Online Shopping Content Filter Strategy Hring/Firing Best Available Operating System Flash Cast Password Management Data Security Emergency End of Support Law Enforcement Science Social Windows 10 Pain Points Privacy Politics Search Engine Users Company Culture Bluetooth Lifestyle Machine Learning Solid State Drive Charger Quick Tips Virus Data Breach Customers Wiring Internet Managed IT Services Running Cable Upgrade Data Management Digital Signature avoiding downtime Worker Commute Music Outsourced IT Small Business Business Intelligence Distribution User Network Congestion BYOD Windows Media Player Private Cloud Computing Infrastructure Work/Life Balance Office Collaboration Programming E-Commerce USB Multi-Factor Security Training Inventory Smart Office Manufacturing Government Server IT Consultant Antivirus Notifications Outlook Apps Vendor Computer Care Workplace Tips CES Managing Stress Intranet NIST Data Backup Business Mangement PowerPoint Password Manager Remote Work The Internet of Things Staff Congratulations Help Desk Benefits Phone System Employee PDF Telecommuting Productivity Blockchain Cables Windows 7 Virtual Desktop Instant Messaging Virtual Assistant Business Owner Storage Customer Service eWaste Unified Communications Wireless Technology Voice over Internet Protocol Cloud Computing Mobility YouTube Cloud Meetings Physical Security Patch Management Education Regulations Mouse Shortcuts Cortana How To HBO IT service Marketing Leadership Virtual Private Network Analyitcs Biometric Security Cleaning Backup and Disaster Recovery Digital Payment Apple Line of Business Accountants Touchpad Chromecast Microchip Data Protection analytics Microsoft Wi-Fi Managed IT Services Analysis Cybersecurity Disaster Recovery IT Solutions Printers Sports IT Management Bloatware Paperless Office Read Hosted Solution NarrowBand Students Gmail Windows 10s Hosted Solutions Managed Service Vulnerability Consultant Smartwatch Fax Server Frequently Asked Questions Insurance Data Warehousing People Workers Augmented Reality Healthcare Wireless Charging Display Google Search Email Hybrid Cloud Cost Management Redundancy webinar Tablet Practices Authentication Internet Exlporer Reputation Employer Employee Relationship Health Robot Wearable Technology Legal Cameras Business Computing Battery Retail Browser Product Reviews Rootkit Gaming Console CrashOverride Analytic Word Identity Theft Amazon Mobile Computing Human Resources Unified Threat Management Netflix Enterprise Content Management SaaS Proactive Google Alert Data storage Connectivity

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *