Contact us today!

Network Solutions Unlimited Blog

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

Extension Restrictions
While Chrome’s biggest asset is quite possibly its extensive library of add-on extension programs, security concerns that have frequently appeared in these extensions have led Google to pump the brakes a little and impose some new requirements. For instance, with cryptocurrency becoming such a huge topic in recent months, many extensions dedicated to mining and even cryptojacking popped up. Google is now putting the kibosh on these supplemental programs. Furthermore, Google is going to hold developers in general to a higher standard, requiring their accounts to be protected by two-factor authentication and putting those extensions that require extensive permissions, or feature code that is hosted remotely closer under the microscope.

Security Measures
In addition to putting extra restrictions on its extensions, Chrome 70 has a few additional security tricks packed in, including measures meant to foil phishing attacks and protect the end user from their influence. Chrome 70 is also going to push education of its native password management tools. Perhaps most apparent to the end user, instead of confirming that a URL is secure to access, Chrome will warn users when one is not. This makes sense, as it reinforces that more websites should be secure than aren’t.

Login Concerns
Not all of these changes have received such a warm welcome. One change in particular alarmed many users when it appeared. Prior versions of Chrome have allowed users to access Chrome without logging into the browser. However, some users have noticed that Chrome now appears to log a user in, even if they are only using a single service.

The big concern with users here is that Google could possibly now share a user’s data, like their browsing history, something that the previous status quo didn’t require. However, Google has announced that this isn’t an indication that Chrome has been logged in to, it is actually a kind of “in-between” alert to inform a user of which of their accounts are currently logged in.

Of course, as we spend more time with Chrome 70, more things we like will emerge, as well as things we don’t like. If you’ve used Chrome 70, what do you think about it? Share your thoughts in the comments!

A Busy Staff Isn’t Always a Productive Staff
Getting to Know Technology: Link


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Accessory How To Assessment Commerce Financial Technology Audiobook Websites Troubleshooting Wasting Time Privacy Saving Time Encryption Management Cortana VPN Monitor USB Rootkit App IT Management Facebook Black Market Paperless Office Virtual Assistant Business Computing WiFi Windows 10 Government Humor IT Solutions Small Business Business Technology Legal Laptop Chrome Computers Microsoft Office Vendor Management IoT Professional Services Training Techology Video Games Data Loss Computing Infrastructure CrashOverride Monitors Productivity Big Data Employee-Employer Relationship Mobile Device Experience Webinar Vendor Testing Employer-Employee Relationship Disaster Recovery Private Cloud Smartphones Password Robot Spam Two-factor Authentication Quick Tips Upgrades Business Management Retail Windows 7 Google Email HaaS Data Backup Business Continuity User Error Analysis Remote Workers Save Time User Tips Mobile Device Management eWaste Hiring/Firing Blockchain Communications IT Support Remote Computing Samsung Hacking Malware Internet Exlporer Data Management WIndows Server 2008 Spyware Virtualization Content Chromebook Telephone Workers Benefits Credit Cards Budget Wasting Money Outlook Payroll Sync Operating System Printers Best Practice Consultant Employer Employee Relationship Connectivity Outsourced IT Unified Communications Cybersecurity Access Control Hard Drives Windows Edge Emergency Saving Money Cast iPhone Sales Data storage PDF Excel Information Data Security Browser Software Telephone Systems Phishing Data Printing IT budget Language Hybrid Cloud Worker Public Computer Comparison Wireless Technology Safety Downtime Charger Internet exploMicrosoft Virtual Private Network Nanotechnology iOS Ciminal Tech Support Streaming Media Peripheral Licensing Gamification Wireless Internet HIPAA intranet Marketing Hard Drive Gifts The Internet of Things Identity Theft Colocation Hardware Network Security Data Theft Maintenance IT Support Hard Disk Drive Cloud Computing Remote Monitoring Books Scam Legislation Identities Smart Technology Microsoft Excel Students Education Scalability Data Breach Alexa for Business Hackers Amazon Windows 10s Financial Keyboard Shortcuts Wireless Miscellaneous Advertising Computer Google Docs Personal Information Devices Emails Patch Management Cost Management Screen Mirroring Data Protection Phone System Business Office Tips Vulnerability Content Filter Google Maps File Storage Application Data Storage Virtual Reality Google Drive Upgrade Human Resources Redundancy Computer Fan Search Device Security Television Content Filtering Going Green Windows 10 Fraud Windows Ink Evernote Gmail Internet of Things Battery Information Technology Utility Computing Identity Politics Mobility Worker Commute Ransomware Business Intelligence Unified Threat Management VoIP Touchscreen Law Enforcement Networking Travel Automation Apple BDR Regulation Cybercrime Holiday Managed IT Services Backup Bluetooth Transportation Server Data Recovery Artificial Intelligence Chromecast Recovery hacker App store Congratulations Files Twitter Applications Dark Web PowerPoint Hosted Solutions Admin End of Support Storage Updates Solid State Drive Touchpad Adobe Cleaning Users Workplace Tips Business Owner Managed IT Service Computer Accessories Cloud Cache Lifestyle Customer Work/Life Balance Computer Care Co-Managed Services Managing Stress Office 365 Display OneNote Tech Term Loyalty Microsoft Word Network Tip of the Week Avoiding Downtime Managed IT Services Software as a Service History Health Mobile Save Money HBO Compliance Social Engineering Social Media Physical Security Hyperlink Apps Update Android Instant Messaging Managed Service Provider Company Culture Firewall SaaS Administration Conferencing Microsoft Relocation Tablets Public Cloud Best Practices Proactive IT WPA3 Unsupported Software Proactive Project Management Mobile Security Antivirus Innovation Specifications FAQ Communication NFL Managed Service Mobile Devices Shortcut Machine Learning WannaCry Hosted Solution Security Virus Projects Productivity Keyboard Word Office Smart Tech Thank You Security Cameras Bring Your Own Device How to IT Service Monitoring Spam Blocking MSP Meetings Entertainment Root Cause Analysis Audit Value IT Services Smartphone Alert Augmented Reality Shadow IT IT solutions Efficiency Computing Internet Reputation Flexibility Memory Wireless Charging Camera Technology Collaboration Two Factor Authentication Automobile Bandwidth Document Management Settings File Sharing Electronic Medical Records Wi-Fi Passwords Risk Management Money Sports Computer Forensics Gadgets BYOD Data Privacy Google Assistant Managed IT Router SMB