Contact us today!

FRS Pros Blog

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

Extension Restrictions
While Chrome’s biggest asset is quite possibly its extensive library of add-on extension programs, security concerns that have frequently appeared in these extensions have led Google to pump the brakes a little and impose some new requirements. For instance, with cryptocurrency becoming such a huge topic in recent months, many extensions dedicated to mining and even cryptojacking popped up. Google is now putting the kibosh on these supplemental programs. Furthermore, Google is going to hold developers in general to a higher standard, requiring their accounts to be protected by two-factor authentication and putting those extensions that require extensive permissions, or feature code that is hosted remotely closer under the microscope.

Security Measures
In addition to putting extra restrictions on its extensions, Chrome 70 has a few additional security tricks packed in, including measures meant to foil phishing attacks and protect the end user from their influence. Chrome 70 is also going to push education of its native password management tools. Perhaps most apparent to the end user, instead of confirming that a URL is secure to access, Chrome will warn users when one is not. This makes sense, as it reinforces that more websites should be secure than aren’t.

Login Concerns
Not all of these changes have received such a warm welcome. One change in particular alarmed many users when it appeared. Prior versions of Chrome have allowed users to access Chrome without logging into the browser. However, some users have noticed that Chrome now appears to log a user in, even if they are only using a single service.

The big concern with users here is that Google could possibly now share a user’s data, like their browsing history, something that the previous status quo didn’t require. However, Google has announced that this isn’t an indication that Chrome has been logged in to, it is actually a kind of “in-between” alert to inform a user of which of their accounts are currently logged in.

Of course, as we spend more time with Chrome 70, more things we like will emerge, as well as things we don’t like. If you’ve used Chrome 70, what do you think about it? Share your thoughts in the comments!

A Busy Staff Isn’t Always a Productive Staff
Getting to Know Technology: Link


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Business Management User Tips Cloud Google Tech Term Hardware Software Hackers Microsoft Computer Malware Data Backup Mobile Devices Browser Productivity Efficiency Smartphone Hosted Solutions Cybersecurity Windows IT Services Windows 10 Data Recovery Data Security Android Office 365 Innovation Cybercrime Data Email Smartphones Apps Internet of Things Outsourced IT Business Continuity Upgrade VoIP Operating System IT Support Backup Money Saving Money Business Communications Mobile Device Management Alert Law Enforcement Vulnerability Disaster Recovery Ransomware Phishing Microsoft Office Managed IT Services Spam Passwords Server IT Support Collaboration Workplace Tips Network Best Practice Employer-Employee Relationship Applications Chrome Small Business Managed IT Windows 10 Managed IT Services Unsupported Software Holiday Artificial Intelligence Computers App Virtualization Blockchain Two-factor Authentication Information Technology Cloud Computing Information Miscellaneous Telephone Systems Tech Support Networking Gadgets OneNote Users Router Google Drive Managed Service Provider Safety Hacking Data Breach Cost Management Gmail Save Money Augmented Reality Communication WannaCry Travel Risk Management Commerce Excel Government Budget Access Control Fraud Managed Service Robot Wi-Fi Wireless Technology Mobile Security Update Proactive IT Evernote Bring Your Own Device SaaS Data Management Politics The Internet of Things Social Media Shortcut User Error Productivity VPN iPhone Google Assistant Touchscreen Data Storage WiFi BDR Sports Cortana Facebook Mobile Device Word Quick Tips Audit Automation Password Data Protection Patch Management Wireless Charging Application Google Docs Project Management Hosted Solution Business Technology Encryption Devices Avoiding Downtime Mobility Transportation Hard Drive Display Computer Fan Licensing Updates Laptop Virtual Assistant Upgrades Comparison Hard Disk Drive IT Management Outlook Memory Human Resources Microsoft Excel IT budget Private Cloud Testing Credit Cards App store Computer Forensics Peripheral Hacker Google Maps Spyware Bandwidth Marketing BYOD Specifications Virus Going Green Social Chromebook Co-Managed Services Emergency DDoS Microsoft Word Touchpad Alexa for Business Files IT Solutions Recovery Financial Payroll Point of Sale Disaster File Sharing Camera Management Apple Webinar Sales Proactive Printing Telephone Tablets Maintenance Humor Consultant Identity Theft Projects Administrator Sync Security Cameras Remote Monitoring Storage Social Engineering IT solutions Streaming Media FAQ PowerPoint Admin Lithium-ion battery Edge Personal Information Vendor Retail Websites Hyperlink NFL eWaste Vendor Management Reputation Identity iOS WIndows Server 2008 Access Hybrid Cloud Machine Learning Scam Identities Windows 10s HBO Chromecast Charger Data storage Wireless Internet Saving Time Data Loss Ciminal History Employee-Employer Relationship Conferencing Data Theft Remote Computing Health Value Wasting Time Computer Care Nanotechnology Telephony Device Security Screen Mirroring Samsung Data Privacy Windows 7 Internet Exlporer Adobe Workers Amazon Unified Threat Management Legislation Language Legal Solid State Drive Settings Gamification Keyboard Shortcuts Meetings Wireless Gifts Computing Search Accessory Root Cause Analysis Uninterrupted Power Supply Windows Ink Software as a Service Emails Antivirus Cast Office tips Computer Accessories Flexibility Music Advertising Battery Smart Technology Instant Messaging Scalability Analytics es Cache Entertainment End of Support Keyboard HaaS Relocation Training Black Market Monitors Cleaning Big Data Automobile Office Television Managing Stress CrashOverride Company Culture USB Worker Thank You Compliance Printers How To Books PDF Video Games Experience Education Hiring/Firing Mobile Computing Virtual Reality Congratulations Regulation Work/Life Balance Current Events Electronic Medical Records Text Messaging Downtime Crowdsourcing Employer Employee Relationship Phone System Benefits Twitter Save Time