Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

Extension Restrictions
While Chrome’s biggest asset is quite possibly its extensive library of add-on extension programs, security concerns that have frequently appeared in these extensions have led Google to pump the brakes a little and impose some new requirements. For instance, with cryptocurrency becoming such a huge topic in recent months, many extensions dedicated to mining and even cryptojacking popped up. Google is now putting the kibosh on these supplemental programs. Furthermore, Google is going to hold developers in general to a higher standard, requiring their accounts to be protected by two-factor authentication and putting those extensions that require extensive permissions, or feature code that is hosted remotely closer under the microscope.

Security Measures
In addition to putting extra restrictions on its extensions, Chrome 70 has a few additional security tricks packed in, including measures meant to foil phishing attacks and protect the end user from their influence. Chrome 70 is also going to push education of its native password management tools. Perhaps most apparent to the end user, instead of confirming that a URL is secure to access, Chrome will warn users when one is not. This makes sense, as it reinforces that more websites should be secure than aren’t.

Login Concerns
Not all of these changes have received such a warm welcome. One change in particular alarmed many users when it appeared. Prior versions of Chrome have allowed users to access Chrome without logging into the browser. However, some users have noticed that Chrome now appears to log a user in, even if they are only using a single service.

The big concern with users here is that Google could possibly now share a user’s data, like their browsing history, something that the previous status quo didn’t require. However, Google has announced that this isn’t an indication that Chrome has been logged in to, it is actually a kind of “in-between” alert to inform a user of which of their accounts are currently logged in.

Of course, as we spend more time with Chrome 70, more things we like will emerge, as well as things we don’t like. If you’ve used Chrome 70, what do you think about it? Share your thoughts in the comments!

A Busy Staff Isn’t Always a Productive Staff
Getting to Know Technology: Link
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Laptop Hard Drive Worker Commute Productivity Peripheral IT Services Money Business Continuity Touchpad Managed IT Services Sales Analysis PowerPoint OneNote Accessory Chromecast Data Recovery Machine Learning Windows Ink Document Management Instant Messaging Monitors Flexibility Business Computing Worker Unified Threat Management Utility Computing Transportation Productivity hacker Testing Upgrade Screen Mirroring Chrome Google Wi-Fi Security Cameras Automation Computing Spam Co-Managed Services Communications Robot Smartphones Administration Law Enforcement Keyboard Tech Support Professional Services Amazon Automobile Bluetooth Content IT Solutions Business Intelligence Internet Network Security Disaster Recovery Apple Unsupported Software Data Email Mobile Device Management Remote Workers Thank You USB History Data Storage Cloud Computing Samsung Employer-Employee Relationship Public Cloud Backup PDF Compliance FAQ Networking Black Market NFL Keyboard Shortcuts Loyalty IT budget File Sharing Windows Video Games Remote Monitoring Printing IT Service Smart Technology Saving Money Payment Cards Hosted Solution Managed IT Devices End of Support Workplace Tips Router Safety Projects Outsourced IT Maintenance Data Backup Best Practice Big Data Shadow IT Internet Exlporer Identities Software Paperless Office Spyware Google Docs Cast Information Server Websites Private Cloud Connectivity Holiday Sports Scam Payroll Word Employee Public Computer Network Ciminal Communication Software as a Service Twitter Reputation Colocation Windows 7 App Smartphone Financial Google Drive Students User Error Battery Blockchain SaaS Passwords Tech Term Avoiding Downtime Webinar Consultant Government Alert Streaming Media Memory Unified Communications Malware Cybercrime Apps Sync Office Tips Two Factor Authentication Users CrashOverride Smart Tech Risk Management Hosted Solutions Cortana Solid State Drive Hacking Rootkit Charger Analytics Collaboration WannaCry BYOD Managing Stress Entertainment BDR Mobile Security Outlook Managed IT Services Business Owner WPA3 Techology Cache Facebook Virtual Assistant Access Control Chromebook Alexa for Business Hackers Computer Operating System Company Culture Mobile Devices Microsoft Settings Emails How to Data Protection Adobe IoT Data Management Root Cause Analysis Cybersecurity Wasting Time Management Conferencing Office 365 Fraud Advertising Application Wireless Internet Vendor Business Management WiFi Proactive Credit Cards IT solutions Data Breach iOS Data Security Wasting Money Microsoft Excel Privacy HBO Admin Device Security Social Media Work/Life Balance Information Technology Gamification Camera HaaS Hiring/Firing Tablets Managed Service Provider WIndows Server 2008 Identity HIPAA Customer Monitoring Humor Remote Computing MSP Troubleshooting Audit Going Green Comparison Innovation Electronic Medical Records Nanotechnology Medical IT Internet of Things Hardware Edge Two-factor Authentication Monitor Regulation Small Business Gifts Employer Employee Relationship Quick Tips Assessment App store Redundancy Relocation Lifestyle Technology Browser Firewall Experience Wireless Mobility Benefits Hard Disk Drive Meetings Content Filtering Value Managed Service The Internet of Things File Storage Augmented Reality Computer Accessories Emergency Display Android Updates Search Recovery Windows 10 Vendor Management Data Loss Miscellaneous Internet exploMicrosoft Bandwidth User Tips Personal Information Virtual Reality Microsoft Word Storage Language Budget Physical Security VPN Computer Forensics Cleaning Ransomware Shortcut iPhone Workers Employee-Employer Relationship Data Privacy IT Support Proactive IT Vulnerability Virus Licensing Microsoft Office Artificial Intelligence Data Theft Virtualization Hybrid Cloud Password SMB Downtime Excel Wireless Technology Business Technology Windows 10 Google Assistant Save Time Backup and Disaster Recovery Travel Congratulations Applications Printers Mobile Project Management Scalability Marketing Managed IT Service Computer Care Tip of the Week Touchscreen Google Maps Television Bring Your Own Device Books Social Engineering Cost Management Retail Saving Time Legal IT Support Computer Fan Dark Web Health Phone System Phishing Best Practices Hyperlink Computers Office Cloud VoIP Content Filter Spam Blocking Politics Gadgets Financial Technology Update E-Commerce IT Management Legislation Files Antivirus eWaste Business Break/Fix Encryption Telephone Upgrades Save Money Windows 10s Patch Management Evernote Wireless Charging Audiobook intranet Identity Theft Gmail Human Resources Mobile Device Education Data storage How To Training Efficiency Commerce Telephone Systems Virtual Private Network Security Specifications Computing Infrastructure Hard Drives