Infracore LLC Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
Tip of the Week: Use Admin Accounts to Control You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, November 17 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Network Security Business computing Google Hackers Malware Innovation Software Microsoft Data Hardware Business Internet Smartphones Hosted Solutions Backup Tech Term Email Windows 10 User Tips Browser Android Business Continuity VoIP Data Backup Mobile Devices Computer Productivity IT Services Managed IT Services Alert Workplace Tips Business Management Communications Small Business Miscellaneous Smartphone Ransomware Outsourced IT Office Data Recovery Chrome Computers Disaster Recovery Managed IT Services Cloud Computing Artificial Intelligence Efficiency Cybercrime Communication Law Enforcement Network Router Windows 10 Productivity How To Money Passwords Telephone Systems Social Media Password Applications Facebook Virtualization Internet of Things Windows Collaboration Cybersecurity Saving Money Quick Tips Server Upgrade App Health Office 365 Information Social Engineering IT Support Gadgets Work/Life Balance Office Tips Data Protection Vulnerability Spam IT Support Two-factor Authentication Microsoft Office Bring Your Own Device Hacking Mobile Device Management Save Money Connectivity Wi-Fi Holiday Phishing Keyboard Private Cloud Word Data Security BDR Apps Scam Data Breach Google Drive HaaS Automation Computer Care Battery Sports Telephone System Windows 7 End of Support Voice over Internet Protocol Content Management Settings History BYOD Samsung Data Storage Electronic Medical Records Business Intelligence Remote Computing Training Bandwidth Blockchain OneNote Update Flexibility Entertainment Identity Theft Redundancy USB Value Infrastructure IT Management PDF Encryption Avoiding Downtime Firewall Networking Legal Spam Blocking Mobility Automobile Servers Paperless Office IT Plan Managed Service Provider Employer-Employee Relationship VPN Charger Government Operating System Fraud Patch Management Data Management Managed Service Unsupported Software Cleaning Remote Monitoring Public Cloud Comparison Mobile Device Virtual Assistant Marketing Managed IT Website CES Worker Big Data Data storage Music Google Apps Cast Mouse Hybrid Cloud Network Congestion Specifications Video Games Audiobook Rootkit Amazon Web Services Nanotechnology How to Mobile Computing Botnet Transportation Safety Password Management Outlook Politics File Sharing Skype Books Assessment Recovery Recycling Worker Commute Emails Employer Employee Relationship Remote Work Practices Solid State Drive Flash Wearable Technology Workers Addiction Education Smart Office Administrator Apple IT Consultant Digital Signature Online Shopping Smart Tech Black Market Meetings Camera Travel Internet exploMicrosoft Benefits NIST Frequently Asked Questions Augmented Reality Start Menu Television eWaste Computer Accessories Hosted Computing Scalability Audit Cache Computing Infrastructure Document Management Microchip iPhone Leadership Millennials Vendor Management Evernote Advertising Multi-Factor Security HIPAA Cryptocurrency Excel Credit Cards Inventory Wireless Remote Worker Tools Relocation User Error Emergency Public Computer WiFi Criminal IT solutions Physical Security Bluetooth Computer Fan Sync Troubleshooting Loyalty Password Manager Search Engine Save Time Workforce Wireless Charging Devices Wireless Internet Data loss Warranty Smart Technology Current Events Trending Human Resources Best Practice Safe Mode Tip of the week Monitor Access Control Downtime Wiring Google Docs HVAC Information Technology The Internet of Things SaaS Business Mangement Techology Users webinar Machine Learning Bing Accountants Experience Cortana Thought Leadership Wire Screen Mirroring Printer Two Factor Authentication Knowledge Staff Content Windows 10s Windows Server 2008 Amazon Authentication Search Root Cause Analysis Unified Threat Management Humor Internet Exlporer Enterprise Content Management HBO Risk Management Instant Messaging FENG MSP Telephony Files Gmail Virtual Reality Conferencing YouTube Software Tips Help Desk Hiring/Firing Telecommuting Twitter Company Culture Software as a Service Compliance Webinar Managing Stress Thank You Regulation Printers CrashOverride Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

BessieLHuerta 8 Data Backup Terms You Should Know
15 November 2018
I can understand the importance of this content about the data backup and I think it will attract ma...
Constance Rowe Are You Intrigued By the Tech of CES 2018?
15 November 2018
An internal blog is intriguing for the storing of the information. The visitors of the https://www.b...
Leo Reid A Few Security Lessons Your Business Can Learn From Game of Thrones
07 November 2018
Few lessons of the learning have been consumed for the better range of the people. The sort of the i...
Risa Franklin Is a Data Backup Really That Necessary? In a Word: Yes
01 November 2018
Data protection is very important for us with we can get rid from various kinds of problems while ru...
Sybil Stephens Is a Data Backup Really That Necessary? In a Word: Yes
20 October 2018
Backup data for the word Microsoft is really needed that only some written material will be come to ...