Contact us today!

FRS Pros Blog

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

Extension Restrictions
While Chrome’s biggest asset is quite possibly its extensive library of add-on extension programs, security concerns that have frequently appeared in these extensions have led Google to pump the brakes a little and impose some new requirements. For instance, with cryptocurrency becoming such a huge topic in recent months, many extensions dedicated to mining and even cryptojacking popped up. Google is now putting the kibosh on these supplemental programs. Furthermore, Google is going to hold developers in general to a higher standard, requiring their accounts to be protected by two-factor authentication and putting those extensions that require extensive permissions, or feature code that is hosted remotely closer under the microscope.

Security Measures
In addition to putting extra restrictions on its extensions, Chrome 70 has a few additional security tricks packed in, including measures meant to foil phishing attacks and protect the end user from their influence. Chrome 70 is also going to push education of its native password management tools. Perhaps most apparent to the end user, instead of confirming that a URL is secure to access, Chrome will warn users when one is not. This makes sense, as it reinforces that more websites should be secure than aren’t.

Login Concerns
Not all of these changes have received such a warm welcome. One change in particular alarmed many users when it appeared. Prior versions of Chrome have allowed users to access Chrome without logging into the browser. However, some users have noticed that Chrome now appears to log a user in, even if they are only using a single service.

The big concern with users here is that Google could possibly now share a user’s data, like their browsing history, something that the previous status quo didn’t require. However, Google has announced that this isn’t an indication that Chrome has been logged in to, it is actually a kind of “in-between” alert to inform a user of which of their accounts are currently logged in.

Of course, as we spend more time with Chrome 70, more things we like will emerge, as well as things we don’t like. If you’ve used Chrome 70, what do you think about it? Share your thoughts in the comments!

A Busy Staff Isn’t Always a Productive Staff
Getting to Know Technology: Link


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, March 25 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Google User Tips Cloud Business Management Productivity Tech Term Hackers Software Hardware Microsoft Hosted Solutions Mobile Devices Browser Data Backup Computer Malware Smartphone Windows 10 Innovation Cybersecurity Efficiency Windows IT Services Android Data Recovery Data Security Office 365 Email Smartphones Outsourced IT Internet of Things Cybercrime Data Upgrade Apps Backup Business Continuity Communication Operating System IT Support VoIP Communications Mobile Device Management Small Business Vulnerability Saving Money Business Money Phishing Alert Server Disaster Recovery Law Enforcement Ransomware Best Practice Users Employer-Employee Relationship Cloud Computing Spam Applications Chrome Microsoft Office Collaboration Network Virtualization Managed IT Services Passwords Information Miscellaneous Social Media IT Support Gadgets Workplace Tips Unsupported Software Facebook App Router Blockchain Automation Two-factor Authentication Google Drive Windows 10 Save Money Computers Holiday Networking OneNote Artificial Intelligence Information Technology Managed Service Provider Managed IT Telephone Systems Bring Your Own Device Managed IT Services Tech Support Augmented Reality BDR Google Assistant Travel Commerce WannaCry Hybrid Cloud Password Health Excel Fraud Quick Tips Application Hosted Solution Encryption SaaS Business Technology Avoiding Downtime Mobility Hacking Proactive IT Search Evernote Gmail User Error Safety Touchscreen Data Storage WiFi Cortana Mobile Device Risk Management Word Budget Government Conferencing Wireless Technology Audit Data Management Meetings Managed Service Google Docs Project Management Wi-Fi Data Protection Access Control Robot Patch Management Wireless Charging Devices Update Shortcut Productivity Mobile Security Politics The Internet of Things Sports Cost Management IT Management VPN iPhone Data Breach Break/Fix Google Maps Spyware Scam Chromecast Marketing BYOD Hyperlink Reputation Credit Cards App store Data storage Microsoft Word Identity History Specifications Virus Telephony Machine Learning Employee-Employer Relationship File Sharing Samsung Internet Exlporer IT Solutions Wireless Internet Saving Time Remote Computing Medical IT Apple Webinar Value Wasting Time Settings Tablets Maintenance Consultant Data Privacy Windows 7 Wireless Sales Proactive Legal Uninterrupted Power Supply Amazon Downtime Remote Monitoring Storage Social Engineering Antivirus Gamification Keyboard Shortcuts Sync Software as a Service Laptop Edge IT solutions Accessory Transportation FAQ Virtual Assistant E-Commerce NFL eWaste Hard Drive Display Private Cloud Retail Websites Hacker Files Testing Identities DDoS iOS WIndows Server 2008 Memory Human Resources Emergency Disaster Bandwidth Touchpad Data Loss Ciminal Recovery Windows 10s HBO Computer Forensics Peripheral Going Green Social Charger Alexa for Business Payment Cards Device Security Point of Sale Screen Mirroring Chromebook Co-Managed Services Data Theft Computer Care Nanotechnology Adobe Workers Unified Threat Management Camera Legislation Language Entertainment Financial Payroll Humor Identity Theft Administrator Solid State Drive Management Employee Windows Ink Streaming Media Emails Cast Printing Telephone Gifts Computing Lithium-ion battery Root Cause Analysis Licensing Updates Upgrades Projects Personal Information Comparison Computer Fan Security Cameras Vendor Microsoft Excel IT budget Vendor Management Access Hard Disk Drive PowerPoint Admin Outlook Compliance PDF How To Books Education Hiring/Firing Printers Mobile Computing Video Games Experience Congratulations Virtual Reality Cache Work/Life Balance es Regulation Text Messaging Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits Phone System Training Monitors Save Time Television CrashOverride Office tips Computer Accessories Twitter Advertising Battery Smart Technology Flexibility Music Company Culture Instant Messaging Scalability Analytics Keyboard HaaS End of Support Black Market Cleaning Relocation Automobile Office Big Data Managing Stress Thank You USB Worker