Infracore LLC Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
Tip of the Week: Use Admin Accounts to Control You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, March 22 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Hosted Solutions Network Security Productivity Malware Innovation Software Microsoft User Tips Hackers Data Internet Hardware Business Email Smartphones Tech Term Mobile Devices Backup Workplace Tips Smartphone Browser Efficiency Windows 10 VoIP Communications Data Backup Android Business Continuity IT Services Business Management Cloud Computing Computer Outsourced IT Managed IT Services Alert Disaster Recovery Small Business Data Recovery Chrome Managed IT Services Ransomware Office Windows 10 Computers Artificial Intelligence Miscellaneous Router Communication Cybersecurity Cybercrime Windows Law Enforcement Network IT Support Internet of Things Collaboration Productivity Money Passwords Health Office 365 Social Media Password Applications How To Facebook Virtualization Gadgets Mobile Device Telephone Systems Holiday Quick Tips Server App Information Wi-Fi Spam Private Cloud Social Engineering Work/Life Balance Google Drive Automation Saving Money Word Upgrade BDR Microsoft Office Hacking Scam Data Breach Paperless Office Vulnerability Settings Data Protection Voice over Internet Protocol Mobility Managed Service Two-factor Authentication Mobile Device Management Apps Encryption Bring Your Own Device Save Money Connectivity HaaS Phishing Operating System Office Tips Data Security IT Support Keyboard Patch Management Remote Monitoring Remote Computing Comparison Cryptocurrency Managed IT Website CES Servers Telephony Flexibility Cleaning Windows 7 Worker PDF Botnet Legal Big Data Content Management Automobile Computer Care BYOD Machine Learning Managed Service Provider Data Storage Business Intelligence Government Virtual Assistant Meetings Electronic Medical Records Blockchain OneNote Data Management Samsung Update Bandwidth Redundancy Identity Theft Training IT Management Infrastructure Sports Spam Blocking Entertainment Public Cloud Telephone System Avoiding Downtime Marketing USB Value Firewall Networking Software as a Service IT Plan Battery VPN Save Time Human Resources Employer-Employee Relationship End of Support Google Docs History Fraud Charger Access Control Augmented Reality Unsupported Software Business Mangement Document Management Windows 10s Microchip Windows Server 2008 Education Accountants Apple Screen Mirroring Net Neutrality HBO Black Market Staff Internet exploMicrosoft Root Cause Analysis Smartwatch Cortana SaaS Thought Leadership Two Factor Authentication Knowledge FENG Social Experience Amazon Authentication Conferencing Remote Worker Software Tips Gmail Search Engine Computing Infrastructure Risk Management Telecommuting iPhone Cast ISP Scalability Wireless Internet Warranty Outlook Specifications Hiring/Firing Advertising Safe Mode Employee Google Apps Wireless Network Congestion Relocation User Error HVAC Vendor Skype Music Amazon Web Services Nanotechnology Emails Wiring Recovery Transportation Recycling Safety Solid State Drive Bing Flash Politics Remote Work Rootkit Practices Cryptomining Addiction Monitor Wire Printer Frequently Asked Questions Employer Employee Relationship Digital Signature Digital Signage Travel Best Practice Books Workers Assessment IT Consultant Enterprise Content Management Display Start Menu Wearable Technology Online Shopping Smart Tech Unified Threat Management Information Technology Benefits eWaste YouTube Audit Help Desk Techology Users Hosted Computing MSP Database Television Cache Mouse Excel Millennials Computer Accessories Google Search Content Search Multi-Factor Security HIPAA Leadership Humor Internet Exlporer Password Management Security Cameras Tools Evernote IT solutions Mobile Computing Physical Security Instant Messaging WiFi Criminal Files Computer Fan Sync Virtual Reality Credit Cards Vendor Management Inventory File Sharing Business Technology Emergency Password Manager Public Computer Data storage Smart Office Administrator Tip of the week Workforce Bluetooth Hybrid Cloud Data loss Proactive IT Video Games Audiobook Camera How to Trending NIST Downtime Hacker Troubleshooting Wireless Charging Loyalty Devices Smart Technology Current Events The Internet of Things Shortcuts Worker Commute webinar Regulation Printers Thank You Twitter Congratulations Webinar CrashOverride Company Culture Compliance Managing Stress Biometric Security

Recent Comments

Thaddeus Greer Can Chargers Be Interchanged Between Devices?
21 March 2019
The infracore is known as the heart of the information technology all over the world and the issue d...
AngusCousens What is Encryption, Anyways?
19 March 2019
When we hold the computer the basic and stylish accessories with the desktop is the requirement of e...
Kevyn Hawkins In the Midst of Chaotic Financial Markets, Technology Remains a Constant
15 March 2019
For the finance market we have to read this blog really and very carefully for the chapter of the pa...
Micheal williams Tip of the Week: Improve Email Open Rates With an Attention-Grabbing Title
15 March 2019
In this modern world, technology has changed the world and even it has created many chances to creat...
Maddison Franklin Tip of the Week: Improve Email Open Rates With an Attention-Grabbing Title
14 March 2019
IT is the heart of technology all over the world and there are many ease by the use of this technolo...