XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
A Virtual Private Network Builds Organizational Fl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, November 14 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Data Small Business Hosted Solutions Hardware Google Mobile Devices Productivity Mobile Office VoIP Gadgets Email Malware Quick Tips Network Security Network IT Support Efficiency Innovation Social Media Business Management IT Services Business Continuity Server Smartphones Business Miscellaneous Upgrade Virtualization Communication Windows Disaster Recovery Computer Communications Data Backup User Tips Managed IT Services Microsoft Office Users Mobile Device Management Passwords Browser Android Save Money Marketing Smartphone WiFi Data Recovery Holiday Ransomware Alert Mobile Computing Tech Term Vendor Management Outsourced IT Internet of Things Chrome Cybercrime BDR Operating System Windows 10 Remote Monitoring Bring Your Own Device Apple Computers BYOD Information Technology Avoiding Downtime Cloud Computing Artificial Intelligence Router Firewall Going Green Automation Current Events Telephone Systems Big Data Remote Computing VPN History Best Practice IT Solutions The Internet of Things Wireless Technology Application Printer Facebook Collaboration IT Consultant Hacking Spam Social Engineering Health Managed IT Services Employer-Employee Relationship Cybersecurity Trending Phone System App Lithium-ion Battery Bandwidth Money Proactive IT Office Excel Budget Content Filtering Productivity Recovery Windows 10 Business Managament Networking Unified Threat Management Business Intelligence Fax Server Maintenance Windows 8 Two-factor Authentication iPhone Mobility Applications Mouse How To User Error Data Protection Value Sports Phishing Humor Apps Outlook Website Managed IT Tutorials Data Security Virus PowerPoint Antivirus Gmail Private Cloud Redundancy Analytics Customer Relationship Management Law Enforcement Hard Drives Information Office 365 Training Conferencing Network Congestion Tablet Administration Connectivity Blockchain Search Twitter Save Time Google Drive Word Mobile Device Document Management Social Networking Digital Payment Office Tips Streaming Media Risk Management Computer Repair Identity Theft IT Support Vulnerability Compliance Flexibility Entertainment Saving Time Administrator IT Management Settings Servers Retail Data Management Tech Support Downtime File Sharing Memory Analysis Scam Inbound Marketing Encryption Data loss Hacker Content Management Bluetooth Unsupported Software Password Managed Service Wireless Physical Security Infrastructure People Paperless Office Cleaning Samsung Touchscreen Spam Blocking Public Cloud SaaS Update Online Currency USB Robot Recycling Virtual Assistant Data storage Point of Sale Comparison Education Windows 7 Video Surveillance Internet Exlporer eWaste Statistics OneNote Telephone System Webinar PDF Programming Data Storage Safety Wi-Fi Skype Piracy HaaS End of Support Voice over Internet Protocol IBM YouTube Credit Cards Keyboard Access Control Government Leadership Augmented Reality Intranet Work/Life Balance Data Breach Smart Tech Meetings Running Cable Instant Messaging Wearable Technology Computer Accessories Environment Machine Learning Fraud Workers Human Resources DDoS CES Biometrics IT Plan Solid State Drive Social IT service Black Market Best Available HVAC Printer Server Shortcut Chromecast Tip of the week Amazon Text Messaging Nanotechnology Remote Worker Macro Distributed Denial of Service Files Software as a Service Debate Telecommuting Gaming Console Knowledge Practices Co-managed IT User Tools Work Station FENG Search Engine Worker Commute Accountants Business Technology Managing Stress Domains Sync Cables Patch Management Addiction Virtual Private Network Bloatware Notifications Screen Mirroring Enterprise Content Management Laptop Windows Server 2008 Amazon Web Services 360 Emails Wiring Science Colocation Shadow IT Software Tips Remote Work Hosted Computing Proactive SharePoint Password Manager Electronic Medical Records Students Bing Business Owner Telephony Unified Communications Windows 10s Cache Project Management Entrepreneur Hybrid Cloud Charger Cast Password Management Touchpad Online Shopping Devices GDPR Tablets IaaS Computing Infrastructure Google Docs Staff IT Security Windows Media Player Virtual Desktop Legal HIPAA Inventory Remote Monitoring and Maintenance Hiring/Firing Relocation Botnet Business Mangement Print Server Hiring/Firing Healthcare Remote Support Webcam IoT Monitor Start Menu Theft nternet Crowdfunding Wireless Internet Warranty Cost Management Data Warehousing Specifications Computer Care NIST Regulations Evernote Hosted Solution Thought Leadership E-Commerce Upgrades Analyitcs Digital Signature Electronic Health Records Help Desk Customer Service HBO Company Culture Line of Business Travel Criminal Law Firm IT Consultant Reputation Mobile Cortana PC Care Audit Wire Microchip Millennials Scheduling Cryptocurrency Wireless Charging 3D LinkedIn Netflix Content Filter Camera Internet exploMicrosoft Multi-Factor Security Strategy Cameras NarrowBand Frequently Asked Questions Net Neutrality eBay Authentication MSP Root Cause Analysis Windows 8.1 Update Supercomputer Insurance Licensing Customers Professional Services Google Apps Alerts Computer Fan Smart Office Uninterrupted Power Supply Workforce Display Safe Mode WIndows 7 Flash Fiber-Optic Storage Virtual Reality Advertising Lifestyle Worker Scalability Music Audiobook Assessment Rootkit How to Techology Politics Television Transportation Troubleshooting Webinar Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Regulation Smart Technology Thank You Loyalty Battery Books Video Games Experience Content Two Factor Authentication Congratulations Utility Computing Emergency Printers

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name
      • First Name *
      • Last Name *
      • Phone *
      • Phone Ext.
      • Comments:
      • Yes, subscribe me to: