Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

Extension Restrictions
While Chrome’s biggest asset is quite possibly its extensive library of add-on extension programs, security concerns that have frequently appeared in these extensions have led Google to pump the brakes a little and impose some new requirements. For instance, with cryptocurrency becoming such a huge topic in recent months, many extensions dedicated to mining and even cryptojacking popped up. Google is now putting the kibosh on these supplemental programs. Furthermore, Google is going to hold developers in general to a higher standard, requiring their accounts to be protected by two-factor authentication and putting those extensions that require extensive permissions, or feature code that is hosted remotely closer under the microscope.

Security Measures
In addition to putting extra restrictions on its extensions, Chrome 70 has a few additional security tricks packed in, including measures meant to foil phishing attacks and protect the end user from their influence. Chrome 70 is also going to push education of its native password management tools. Perhaps most apparent to the end user, instead of confirming that a URL is secure to access, Chrome will warn users when one is not. This makes sense, as it reinforces that more websites should be secure than aren’t.

Login Concerns
Not all of these changes have received such a warm welcome. One change in particular alarmed many users when it appeared. Prior versions of Chrome have allowed users to access Chrome without logging into the browser. However, some users have noticed that Chrome now appears to log a user in, even if they are only using a single service.

The big concern with users here is that Google could possibly now share a user’s data, like their browsing history, something that the previous status quo didn’t require. However, Google has announced that this isn’t an indication that Chrome has been logged in to, it is actually a kind of “in-between” alert to inform a user of which of their accounts are currently logged in.

Of course, as we spend more time with Chrome 70, more things we like will emerge, as well as things we don’t like. If you’ve used Chrome 70, what do you think about it? Share your thoughts in the comments!

A Busy Staff Isn’t Always a Productive Staff
Getting to Know Technology: Link

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Internet Google Hackers Business Management Microsoft User Tips Software Cloud Innovation Efficiency Tech Term Mobile Devices Hardware Malware Data Backup Smartphone Windows 10 Data Recovery Data Computer Browser Office 365 Smartphones Hosted Solutions Cybersecurity Windows Upgrade IT Services Internet of Things Email Android IT Support Outsourced IT Backup Apps Data Security Gadgets Small Business Cybercrime Workplace Tips Communication Disaster Recovery Business Continuity Communications Mobile Device Management VoIP Operating System Network Phishing Law Enforcement Ransomware Saving Money Employer-Employee Relationship Users Vulnerability Server Money Business OneNote Alert Passwords Automation Miscellaneous Information Social Media IT Support Managed IT Services Health Applications Wireless Cloud Computing Spam Virtualization Chrome Collaboration Microsoft Office Artificial Intelligence Managed IT Services Best Practice Blockchain Managed Service Two-factor Authentication Managed Service Provider Managed IT Bring Your Own Device BYOD Windows 10 Facebook Unsupported Software Networking Save Money Router App Computers Word Google Drive Telephone Systems Holiday Tech Support Information Technology Robot Audit File Sharing Telephony Excel Data Protection Fraud Meetings Access Control Password The Internet of Things Printing Wi-Fi Evernote VPN iPhone Update Mobile Security Politics IT Management User Error Hacking Cost Management Shortcut Augmented Reality Google Assistant Gmail Hybrid Cloud WannaCry Cortana BDR Commerce Quick Tips Data Loss Hosted Solution Conferencing Budget Search Windows 7 Avoiding Downtime Mobility Proactive IT Business Technology Google Docs Project Management SaaS Application Patch Management Wireless Charging Wireless Technology Devices Encryption Data Management Safety Touchscreen Data Storage Productivity WiFi Data Breach Government Mobile Device Sports Travel Risk Management Camera Humor Unified Threat Management Point of Sale Financial Payroll Solid State Drive Entertainment Employees Apple Internet Exlporer Windows Server 2008 R2 Management Cast Identity Theft Employee Tablets Maintenance Paperless Office Root Cause Analysis Telephone Sales Proactive Personal Information Emails Security Cameras Sync Computer Fan Projects Storage Social Engineering Uninterrupted Power Supply Upgrades Office Reputation Hard Disk Drive Vendor OneDrive Edge Mobile Office PowerPoint Admin FAQ Marketing Vendor Management Break/Fix NFL eWaste Data storage Smartwatch Hyperlink Retail Websites History Machine Learning Remote Computing Identity Identities Scam IT Solutions Employee-Employer Relationship Voice over Internet Protocol Ciminal DDoS Development Education Wireless Internet Saving Time Charger Files Webinar Samsung Medical IT Device Security Recovery Server Maintenance Settings Value Wasting Time Data Theft Disaster Amazon Downtime Adobe Workers Data Privacy Legislation Language Consultant Transportation Legal Laptop Micrsosoft Remote Monitoring Gamification Keyboard Shortcuts Private Cloud IT solutions Antivirus Software as a Service 5G Windows Ink Administrator Investment Accessory Gifts Computing Virtual Assistant E-Commerce Licensing Updates Streaming Media Sabotage Hard Drive Display Comparison Lithium-ion battery Going Green Social iOS WIndows Server 2008 Testing Microsoft Excel IT budget Touchpad Business Intelligence Battery Memory Human Resources Outlook Windows 10s HBO Bandwidth YouTube Google Maps Spyware Access ROI Instant Messaging Hacker Computer Forensics Peripheral Credit Cards App store Alexa for Business Payment Cards Microsoft Word Chromecast PC Computer Care Nanotechnology Emergency Chromebook Co-Managed Services Specifications Virus Screen Mirroring es Relocation Scalability Analytics Congratulations Digital Signage Keyboard Black Market Cleaning Big Data Automobile PDF Managing Stress Compliance USB Worker Mobile Computing How To Books Printers Video Games Experience Text Messaging Cache Hiring/Firing Work/Life Balance Regulation Virtual Reality Training Current Events Monitors Electronic Medical Records Crowdsourcing Employer Employee Relationship Phone System Office tips Benefits Advertising Television CrashOverride Save Time Twitter Company Culture Computer Accessories Flexibility Music Thank You Smart Technology End of Support HaaS