Contact us today!

Network Solutions Unlimited Blog

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

Extension Restrictions
While Chrome’s biggest asset is quite possibly its extensive library of add-on extension programs, security concerns that have frequently appeared in these extensions have led Google to pump the brakes a little and impose some new requirements. For instance, with cryptocurrency becoming such a huge topic in recent months, many extensions dedicated to mining and even cryptojacking popped up. Google is now putting the kibosh on these supplemental programs. Furthermore, Google is going to hold developers in general to a higher standard, requiring their accounts to be protected by two-factor authentication and putting those extensions that require extensive permissions, or feature code that is hosted remotely closer under the microscope.

Security Measures
In addition to putting extra restrictions on its extensions, Chrome 70 has a few additional security tricks packed in, including measures meant to foil phishing attacks and protect the end user from their influence. Chrome 70 is also going to push education of its native password management tools. Perhaps most apparent to the end user, instead of confirming that a URL is secure to access, Chrome will warn users when one is not. This makes sense, as it reinforces that more websites should be secure than aren’t.

Login Concerns
Not all of these changes have received such a warm welcome. One change in particular alarmed many users when it appeared. Prior versions of Chrome have allowed users to access Chrome without logging into the browser. However, some users have noticed that Chrome now appears to log a user in, even if they are only using a single service.

The big concern with users here is that Google could possibly now share a user’s data, like their browsing history, something that the previous status quo didn’t require. However, Google has announced that this isn’t an indication that Chrome has been logged in to, it is actually a kind of “in-between” alert to inform a user of which of their accounts are currently logged in.

Of course, as we spend more time with Chrome 70, more things we like will emerge, as well as things we don’t like. If you’ve used Chrome 70, what do you think about it? Share your thoughts in the comments!

A Busy Staff Isn’t Always a Productive Staff
Getting to Know Technology: Link


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

eWaste Wireless Technology Internet exploMicrosoft Unified Communications Wireless Charging Outsourced IT Managed IT Service Identity Theft Advertising Cloud Computing Bluetooth Alexa for Business Meetings Smartphones Language Blockchain Update Application Safety Employer-Employee Relationship Ciminal Apple Business Continuity Holiday Outlook FAQ Workers Colocation Smart Technology Robot How to Managed Service Provider Two Factor Authentication Company Culture Scalability Windows 7 Projects Physical Security Productivity Networking Relocation Microsoft Office Managed Service Users Experience Disaster Recovery Excel Save Time Cybersecurity Public Cloud Admin OneNote Mobile Device Management Customer Troubleshooting IT budget App Virus History Privacy Training Administration Going Green Malware Chromebook Accessory Data Privacy Connectivity Commerce Content Adobe Patch Management Office 365 Proactive Comparison BYOD Network Virtual Assistant Managed IT Services WiFi Wireless VoIP Google User Tips Cybercrime Office Smart Tech Data Storage Managed IT Services Keyboard Downtime Router Data Breach Backup Touchscreen Tech Term Unsupported Software Software as a Service Humor MSP Lifestyle SaaS Hacking Computers Mobile IT solutions Monitors Unified Threat Management Automation Phone System Cleaning Cloud Word Social Media IT Services Amazon The Internet of Things Instant Messaging Innovation Efficiency Social Engineering Managed IT Virtualization Assessment Nanotechnology Sales hacker Worker Root Cause Analysis Computing Ransomware Vulnerability Books Health Employer Employee Relationship Remote Computing Money iPhone Public Computer Edge Password Techology Printers Tip of the Week Data Theft Internet Legislation File Storage Wasting Money Budget Computer Accessories Cortana Mobility Windows Data Backup Smartphone Tech Support Google Docs USB Applications Hiring/Firing Hard Drive Government Scam Computer Forensics Audiobook Evernote Telephone Systems Utility Computing Document Management PDF Solid State Drive Productivity Spam Blocking Emails Device Security IT Support Worker Commute Bring Your Own Device Credit Cards Managing Stress Business Management Files iOS Bandwidth Automobile Windows 10 Computer Black Market Identity Augmented Reality Updates Congratulations Hosted Solution Telephone Shortcut Access Control Thank You Business Intelligence Business Technology Data Charger Data Recovery Virtual Reality Software Data storage Employee-Employer Relationship Hard Disk Drive Passwords Business Technology Mobile Device HBO Work/Life Balance Audit Cost Management Project Management WPA3 BDR Memory Redundancy Spyware Tablets Facebook Saving Time Quick Tips Google Assistant Consultant Financial How To Politics intranet Twitter Risk Management Save Money Battery IT Solutions Monitor Server Television End of Support Law Enforcement Regulation Gmail Upgrades Printing Network Security Business Owner Small Business Financial Technology App store Education Alert Sports IT Management Conferencing WIndows Server 2008 HIPAA Travel Data Management File Sharing Computing Infrastructure IoT Wasting Time Marketing HaaS Data Security Cache Avoiding Downtime NFL Emergency Gifts Big Data Apps Rootkit Compliance Cast CrashOverride Operating System Vendor Vendor Management Hyperlink Firewall Analysis Streaming Media Dark Web Benefits Value Internet of Things Loyalty Private Cloud Hardware Keyboard Shortcuts Search Settings IT Support Recovery Monitoring Flexibility VPN Google Maps Maintenance Antivirus Remote Monitoring Laptop Best Practice Computer Care Best Practices Gamification Android Management Information Mobile Devices Hosted Solutions Phishing Security Wireless Internet Licensing Fraud Hackers Identities Communications Shadow IT Sync Spam Google Drive Upgrade Transportation PowerPoint Proactive IT Office Tips Video Games Personal Information Electronic Medical Records Touchpad Websites Gadgets Microsoft Word Data Protection Display Windows 10 Retail Microsoft Business Computing Encryption Hybrid Cloud Storage Camera Entertainment Chrome Reputation Miscellaneous Students Mobile Security Legal Two-factor Authentication Testing Chromecast Windows 10s Communication Hard Drives Samsung Peripheral Windows Ink Content Filter Browser Collaboration Specifications Content Filtering Professional Services Computer Fan Email User Error Webinar Artificial Intelligence Internet Exlporer Devices Microsoft Excel Workplace Tips Information Technology Wi-Fi Saving Money WannaCry Co-Managed Services Data Loss Screen Mirroring