XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
A Virtual Private Network Builds Organizational Fl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Efficiency Network IT Support Innovation IT Services Business Social Media Business Management Business Continuity Smartphones Server Miscellaneous Upgrade Communication Virtualization User Tips Windows Disaster Recovery Communications Data Backup Computer Microsoft Office Managed IT Services Users Smartphone Browser Mobile Device Management Data Recovery Passwords Android Holiday WiFi Save Money Marketing Outsourced IT Tech Term Alert Ransomware Mobile Computing Internet of Things Vendor Management Cybercrime BDR Operating System Windows 10 Remote Monitoring Chrome Cloud Computing Router BYOD Automation Artificial Intelligence Information Technology Avoiding Downtime Computers Bring Your Own Device Apple History IT Solutions Best Practice Going Green Telephone Systems The Internet of Things VPN Firewall Managed IT Services Spam Cybersecurity Big Data Current Events Remote Computing Trending Social Engineering Employer-Employee Relationship Printer Facebook Phone System Application Wireless Technology Health Collaboration Hacking IT Consultant Productivity Excel Windows 10 App Office Mobility Money Budget Proactive IT Lithium-ion Battery Bandwidth Windows 8 Mobile Device Networking Phishing Unified Threat Management Office 365 Applications IT Support Two-factor Authentication iPhone Business Managament Mouse Recovery Business Intelligence Content Filtering Fax Server How To Maintenance Website Apps Private Cloud Data Protection Blockchain Gmail Redundancy PowerPoint Law Enforcement Word Settings Value User Error Sports Encryption Data Security Humor Access Control Customer Relationship Management Outlook Hard Drives Training Tutorials Virus Google Drive Information Antivirus Managed IT Analytics Software as a Service Office Tips Wi-Fi Downtime Digital Payment File Sharing Memory Tech Support Connectivity Social Networking Compliance Computer Repair Flexibility Conferencing Scam Data Management Entertainment Administrator Tablet Retail Search Vulnerability Twitter Identity Theft Human Resources Document Management Voice over Internet Protocol Streaming Media Risk Management Network Congestion Hacker Machine Learning IT Management Inbound Marketing Social Servers Saving Time Analysis Save Time Administration Managed Service Content Management Safety HaaS End of Support YouTube Unsupported Software Government Infrastructure Spam Blocking Video Surveillance Best Available Meetings Display Update Virtual Assistant Bluetooth People DDoS Solid State Drive Comparison Piracy Samsung Telephony Instant Messaging IBM Google Docs OneNote Black Market Telephone System Windows 7 Environment Leadership Online Currency Botnet Cleaning Password Data Storage Computer Accessories Point of Sale Wireless Physical Security Biometrics Recycling IT service Smart Tech Keyboard Education Public Cloud Credit Cards Work/Life Balance Data Breach Statistics SaaS Skype Data storage Webinar Workers Programming CES Fraud Intranet Internet Exlporer Help Desk IT Plan USB Touchscreen Running Cable eWaste Robot Augmented Reality Paperless Office Data loss Wearable Technology PDF FENG Net Neutrality Accountants Business Technology Tip of the week Amazon Tablets Knowledge Addiction Virtual Private Network Windows 8.1 Update Enterprise Content Management Telecommuting Hiring/Firing Wiring Tools Windows Media Player Patch Management Virtual Desktop Students Bing Screen Mirroring Reputation Hosted Computing Proactive Sync Cables 360 Cost Management Emails Electronic Medical Records Windows Server 2008 Amazon Web Services Upgrades Analyitcs Debate Internet exploMicrosoft Cache Project Management NarrowBand Password Management Software Tips Remote Work Business Owner Macro Devices GDPR Password Manager Customer Service Windows 10s Webcam Uninterrupted Power Supply Healthcare Shortcuts Consultant Charger Cast Customers Co-managed IT Inventory Remote Monitoring and Maintenance Unified Communications Warranty Staff Hiring/Firing IoT Online Shopping HIPAA Advertising Wireless Internet Chromecast NIST PC Care Distributed Denial of Service Files Thought Leadership E-Commerce Business Mangement Cameras Electronic Health Records eCommerce Data Warehousing Specifications Licensing Computer Care 3D Line of Business Start Menu Theft Hosted Solution Scheduling Wire Microchip Digital Signature WIndows 7 eBay Regulations Evernote Virtual Reality IT Security Notifications Criminal Printer Server Shortcut Audit Laptop Cryptocurrency HBO Alerts Print Server Colocation Content Filter Camera Travel Shadow IT Vendor Millennials User nternet Crowdfunding SharePoint Authentication MSP Mobile Cortana Worker Commute Netflix Remote Support Smart Office Multi-Factor Security Strategy Managing Stress Domains Root Cause Analysis Text Messaging Insurance Wireless Charging Bloatware Hybrid Cloud Computer Fan Gaming Console Company Culture Touchpad Safe Mode Frequently Asked Questions Science Supercomputer Work Station Law Firm IT IaaS Computing Infrastructure Storage Legal HVAC Security Cameras Workforce Relocation Nanotechnology Remote Worker Professional Services Google Apps Search Engine Lifestyle LinkedIn Monitor Practices Flash Fiber-Optic Entrepreneur Audiobook Employee/Employer Relationship Assessment Congratulations Rootkit Battery Politics Video Games Television Transportation Smartwatch Troubleshooting Webinar Scalability Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Regulation Smart Technology How to Techology Loyalty Books Utility Computing Experience Two Factor Authentication Content Printers Emergency Worker Music Thank You

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *