Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

Extension Restrictions
While Chrome’s biggest asset is quite possibly its extensive library of add-on extension programs, security concerns that have frequently appeared in these extensions have led Google to pump the brakes a little and impose some new requirements. For instance, with cryptocurrency becoming such a huge topic in recent months, many extensions dedicated to mining and even cryptojacking popped up. Google is now putting the kibosh on these supplemental programs. Furthermore, Google is going to hold developers in general to a higher standard, requiring their accounts to be protected by two-factor authentication and putting those extensions that require extensive permissions, or feature code that is hosted remotely closer under the microscope.

Security Measures
In addition to putting extra restrictions on its extensions, Chrome 70 has a few additional security tricks packed in, including measures meant to foil phishing attacks and protect the end user from their influence. Chrome 70 is also going to push education of its native password management tools. Perhaps most apparent to the end user, instead of confirming that a URL is secure to access, Chrome will warn users when one is not. This makes sense, as it reinforces that more websites should be secure than aren’t.

Login Concerns
Not all of these changes have received such a warm welcome. One change in particular alarmed many users when it appeared. Prior versions of Chrome have allowed users to access Chrome without logging into the browser. However, some users have noticed that Chrome now appears to log a user in, even if they are only using a single service.

The big concern with users here is that Google could possibly now share a user’s data, like their browsing history, something that the previous status quo didn’t require. However, Google has announced that this isn’t an indication that Chrome has been logged in to, it is actually a kind of “in-between” alert to inform a user of which of their accounts are currently logged in.

Of course, as we spend more time with Chrome 70, more things we like will emerge, as well as things we don’t like. If you’ve used Chrome 70, what do you think about it? Share your thoughts in the comments!

A Busy Staff Isn’t Always a Productive Staff
Getting to Know Technology: Link
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Google Tech Term Business Management Cloud Business Computing Software User Tips Hackers Hardware Microsoft Computer Malware Browser Productivity Efficiency Windows Cybersecurity Mobile Devices Data Backup Hosted Solutions Smartphone Innovation Cybercrime Apps Internet of Things Data Recovery Backup Data Security IT Services Office 365 Outsourced IT Operating System Smartphones Email Android Windows 10 Mobile Device Management Vulnerability Business Continuity Phishing Data Upgrade Business IT Support Money VoIP Alert Law Enforcement Disaster Recovery Ransomware IT Support Employer-Employee Relationship Applications Collaboration Saving Money Network Chrome Microsoft Office Managed IT Services Server Communications Best Practice Cloud Computing Spam Router Small Business Google Drive Windows 10 Computers Virtualization Blockchain Two-factor Authentication Managed Service Provider Information Managed IT Information Technology Passwords Telephone Systems Unsupported Software Gadgets Miscellaneous Tech Support App Automation Update Word Password Shortcut Facebook Politics SaaS Google Docs Project Management Workplace Tips Patch Management Wireless Charging Proactive IT Hacking Devices Quick Tips BDR Hosted Solution Gmail Touchscreen Data Storage Data Breach Avoiding Downtime Users WiFi Save Money Mobile Device OneNote Travel Application Excel Audit Communication Encryption Budget Artificial Intelligence Managed Service Safety Fraud Wireless Technology Data Protection Government Data Management Evernote Mobile Security Bring Your Own Device Holiday Cost Management User Error Managed IT Services Robot Productivity Risk Management Augmented Reality Sports Google Assistant WannaCry Networking Cortana Commerce The Internet of Things Social Media VPN iPhone Wi-Fi Device Security Reputation Value Wasting Time Webinar Conferencing Data Theft Internet Exlporer Adobe Workers History Data Privacy Windows 7 Consultant Legislation Language Data storage Amazon Uninterrupted Power Supply Business Technology Remote Monitoring Remote Computing Health Gamification Vendor Management Software as a Service Windows Ink Accessory Scam IT solutions Gifts Computing Licensing Updates Wireless Hard Drive Display Comparison Settings Virtual Assistant iOS WIndows Server 2008 Mobility Testing Microsoft Excel IT budget Search Memory Samsung Outlook DDoS Bandwidth Google Maps Spyware Transportation Files Computer Forensics Peripheral Windows 10s Credit Cards HBO App store Laptop Computer Care Nanotechnology Microsoft Word Private Cloud Disaster Chromebook Co-Managed Services Specifications Screen Mirroring Virus Recovery Alexa for Business Legal Camera Unified Threat Management File Sharing Financial Antivirus Touchpad Apple Meetings Going Green Social Management Access Control Solid State Drive Tablets Root Cause Analysis Maintenance Printing Telephone Emails Sales Cast Proactive Administrator Sync Computer Fan Lithium-ion battery Projects Upgrades Storage Social Engineering Streaming Media Humor Vendor Emergency Edge PowerPoint Admin Hard Disk Drive FAQ IT Management NFL eWaste Hyperlink Point of Sale Marketing Retail BYOD Websites Access Identity Identities Chromecast Hybrid Cloud Telephony Employee-Employer Relationship Data Loss Ciminal Wireless Internet Identity Theft Charger IT Solutions Regulation Big Data Automobile Office PDF Training Monitors Mobile Computing Managing Stress USB Worker How To Books Television CrashOverride Twitter Text Messaging Company Culture Education Hiring/Firing Video Games Experience Virtual Reality Work/Life Balance Office tips Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Benefits Advertising Phone System es Save Time Computer Accessories Music Battery Smart Technology Flexibility HaaS Instant Messaging Hacker End of Support Thank You Relocation Compliance Scalability Analytics Personal Information Printers Keyboard Entertainment Congratulations Black Market Cleaning Cache