window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
A Virtual Private Network Builds Organizational Fl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Data Backup Hosted Solutions Privacy Managed IT Services Hackers Malware Email Data Recovery Mobile Devices VoIP Google Data Internet of Things Outsourced IT Productivity Innovation User Tips Internet Tech Term Communications Hardware Microsoft Cloud Computing Efficiency Backup IT Services Software Business Continuity BDR Artificial Intelligence Workplace Tips Cybersecurity Saving Money Business Business Management Communication Small Business Android Ransomware Smartphones Windows 10 Smartphone IT Support Network Router Cybercrime Disaster Recovery IT Support Managed IT Services Phishing Chrome Applications Gadgets Browser Computer Server How To Mobile Device Collaboration Windows Law Enforcement Encryption Managed IT Business Intelligence Spam Mobile Device Management Virtualization Two-factor Authentication Holiday Mobility Data Security Training Money Data Protection BYOD Save Money Office 365 Computers Word Blockchain Access Control Proactive IT Information Avoiding Downtime Remote Monitoring Analysis Servers App Facebook Managed Service Business Technology Vulnerability Telephone Systems Wi-Fi Settings Private Cloud Passwords Document Management IT Management Redundancy Connectivity Apps Productivity Alert File Sharing Compliance Voice over Internet Protocol Software as a Service Machine Learning Automation Firewall Social Engineering Operating System Identity Theft Miscellaneous Upgrade Paperless Office Bandwidth Social Media Update Google Drive Credit Cards Meetings Unified Threat Management Botnet Human Resources Networking Flexibility Solid State Drive Cryptocurrency Workers Infrastructure Business Owner Information Technology Remote Computing VPN Virtual Private Network Fraud Password Data loss Healthcare Education Bring Your Own Device Augmented Reality Mobile Computing OneNote Virtual Assistant Google Docs Keyboard Manufacturing CES Work/Life Balance Sports Data Breach Hacker Save Time Telephone System IT Plan Budget Microsoft Office Spam Blocking Windows 7 Big Data Content Management Comparison Unsupported Software Telephony Website Scam Data Storage Value Health Employer-Employee Relationship Smart Tech Google Apps Worker Commute Streaming Media Display Windows 10s HIPAA Distribution Leadership Wireless Netflix Windows 10 Legal Entertainment Students Remote Worker Restore Data Excel Millennials Battery Authentication Help Desk eWaste Wireless Internet Google Search Physical Security Lifestyle Insurance USB Administrator Start Menu Wireless Charging Content Filter Security Cameras Data Warehousing SaaS WiFi Hard Drives Logistics Flash Shortcuts Cleaning Travel Staff Wiring Backup and Disaster Recovery Tip of the week Current Events Workforce Fiber-Optic Nanotechnology Computing Infrastructure Criminal Data Management Wire Proactive Net Neutrality Recovery Practices Safe Mode Microchip Mobile Password Manager Storage Employee/Employer Relationship Audit Accountants HVAC Project Management webinar Amazon Wireless Technology eCommerce Screen Mirroring Computer Care Public Cloud Digital Signature Electronic Health Records GDPR Cryptomining Windows Server 2008 Knowledge Telecommuting Cables The Internet of Things Remote Monitoring and Maintenance ISP HBO Marketing Cortana Hosted Computing Vendor Management Professional Services Emails Business Mangement Smartwatch Enterprise Content Management Warranty Biometric Security Sync Conferencing Amazon Web Services Unified Communications Devices Patch Management Social Cast Samsung Managed Service Provider Risk Management E-Commerce Database Network Congestion Remote Work End of Support Smart Office Line of Business File Versioning Outlook Downtime Inventory Search Engine Charger Tools Gmail Addiction Employee Multi-Factor Security Computer Fan Users IoT Password Management Printer Online Shopping Theft Virtual Reality Thought Leadership Vendor Government PDF Strategy YouTube Camera Electronic Medical Records Regulations IT Consultant Office Tips MSP Multiple Versions Frequently Asked Questions Specifications Technology Tips Quick Tips Black Market Content Filtering Bing Root Cause Analysis HaaS Recycling Hacking Cache Digital Signage Software Tips Trending FENG Instant Messaging NIST Mouse Skype Evernote Transportation Loyalty Video Games Company Culture Printers Files Advertising Office Books Public Speaking Colocation Automobile How to Rootkit Benefits Managing Stress Employer Employee Relationship Presentation History Search Best Practice Lithium-ion battery Relocation Troubleshooting Smart Technology Tech Support Scalability Computer Accessories 5G Techology Emergency IBM Two Factor Authentication Safety Humor Internet Exlporer CrashOverride Shadow IT Hosted Solution Utility Computing Twitter Assessment Experience Bluetooth User Error Customer Relationship Management Hybrid Cloud Competition Content IP Address Webinar Regulation Television Hiring/Firing Music Customer Service Politics Analytics IT solutions Fun Internet exploMicrosoft Audiobook Mobile Office Public Computer Wearable Technology Worker Domains

Mobile? Grab this Article!

QR-Code dieser Seite