Infracore LLC Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
Tip of the Week: Use Admin Accounts to Control You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, January 18 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Google Business computing Network Security Microsoft Data Hosted Solutions Malware Hackers Software User Tips Innovation Tech Term Backup Internet Business Hardware Mobile Devices Smartphones Windows 10 Data Backup Business Continuity Browser Smartphone Email Android VoIP IT Services Computer Productivity Outsourced IT Disaster Recovery Small Business Managed IT Services Business Management Data Recovery Alert Workplace Tips Communications Cloud Computing Managed IT Services Efficiency Artificial Intelligence Router Ransomware Computers Chrome Miscellaneous Communication Office Network Windows 10 Law Enforcement Cybercrime Passwords Social Media Telephone Systems How To Holiday Office 365 Collaboration Cybersecurity Password Applications Facebook Virtualization Windows IT Support Internet of Things Productivity Money Health Server Spam App Gadgets Social Engineering Wi-Fi Google Drive Automation Quick Tips Saving Money Upgrade Word Information Mobile Device Work/Life Balance HaaS Managed Service Office Tips Vulnerability IT Support Data Protection Settings Voice over Internet Protocol Bring Your Own Device Private Cloud Save Money Microsoft Office Hacking Two-factor Authentication Mobile Device Management Keyboard Mobility Connectivity Phishing Scam Data Security Data Breach Apps BDR PDF Managed IT Comparison Machine Learning Telephony Battery Virtual Assistant Website CES Electronic Medical Records Windows 7 Samsung Managed Service Provider Training Botnet Bandwidth Entertainment Telephone System Content Management BYOD Remote Computing Sports Government USB Data Storage Value Software as a Service Flexibility Business Intelligence Firewall Networking Public Cloud OneNote Blockchain Redundancy Employer-Employee Relationship Update IT Management Legal Identity Theft Infrastructure Charger Avoiding Downtime Automobile Encryption Spam Blocking Patch Management IT Plan End of Support Servers Cleaning Data Management VPN History Operating System Worker Human Resources Paperless Office Google Docs Big Data Unsupported Software Fraud Access Control Marketing Computer Care Remote Monitoring Cortana iPhone Thought Leadership Politics Root Cause Analysis Rootkit Virtual Reality Staff Transportation HBO Safety Instant Messaging Bing FENG Employer Employee Relationship Conferencing Books Software Tips Assessment Video Games Audiobook Wire Printer Amazon Authentication Advertising IT Consultant How to Enterprise Content Management Display Gmail Wearable Technology Cast Unified Threat Management Telecommuting Relocation User Error Google Apps Worker Commute MSP Specifications Benefits Outlook YouTube Help Desk Computer Accessories Skype Education Monitor Emails Television Mouse Amazon Web Services Nanotechnology Solid State Drive Flash Leadership Black Market Password Management Security Cameras Recovery Recycling Mobile Computing Remote Work Practices Workers Addiction Meetings Vendor Management Travel File Sharing Digital Signature Frequently Asked Questions Bluetooth Start Menu Computing Infrastructure Emergency Public Computer Scalability Smart Office Administrator Online Shopping Smart Tech Audit Save Time NIST Hacker eWaste Troubleshooting Loyalty Camera Humor Hosted Computing Internet Exlporer Shortcuts Cache Augmented Reality Millennials Files Smart Technology Wireless Excel Current Events Evernote Hybrid Cloud Tools Multi-Factor Security HIPAA Data storage IT solutions Physical Security Document Management Microchip Computer Fan Sync Cryptocurrency WiFi Criminal SaaS Best Practice Credit Cards Inventory Social Password Manager Experience Data loss Remote Worker Workforce Two Factor Authentication Tip of the week Knowledge Wireless Charging Apple Devices Risk Management Downtime Techology Users Trending Information Technology Search Engine The Internet of Things Hiring/Firing Safe Mode webinar Content Wireless Internet Warranty Internet exploMicrosoft Windows Server 2008 Network Congestion Search HVAC Vendor Business Mangement Music Screen Mirroring Wiring Accountants Windows 10s Congratulations Twitter Company Culture Compliance Webinar Managing Stress CrashOverride Regulation Smartwatch Printers Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AngusCousens Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?
27 December 2018
What a good story you have written and I feel good reading about your story and we should share thin...
George Nivison Bring Your Own Device Is Great...When Applied Properly
21 December 2018
If you think you device get slow then try once again for the device sharing speed with the connectin...
Chantale Bass Tip of the Week: How to Use Tabs to Their Full Potential
15 December 2018
Tabs we need to use only with the ways of the potentially uses from the internet use and also for th...
JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...