Google warns everyone to update their Chrome browser right now



[ad_1]

It's always a good idea to keep all your software up-to-date, but it's not uncommon for a developer to make all users aware that they must drop everything and apply the latest update as soon as possible. . But that's exactly what Google did this week, as Clement Lecigne of the company's threat analysis group reveals in a blog post, that two "zero-day" vulnerabilities were discovered in Google Chrome.

<p class = "canvas-atom text-canvas Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "Reported for the first time on February 27, Google n & # It was not long before you posted an update two days later on March 1 to fix the problem, and it is likely that your Chrome browser updated automatically, but if you want to check, go to Help me & gt; About Google Chromeand make sure you are on version 72.0.3626.121. Otherwise, perform an update immediately. "Data-reactid =" 19 "> On March 27, Google quickly released an update to fix the problem.The Chrome browser is automatically updated automatically., But if you want to check, go to Help me > About Google Chromeand make sure you are on version 72.0.3626.121. If not, update it immediately.

Related stories

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "The Smart Compose feature of Gmail is now available on all Android devices."data-reactid =" 21 "> The Smart Compose feature of Gmail is now available on all Android devices.

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "Running Bob Ross in Google's DeepDream is as terrifying as you imagine"data-reactid =" 22 "> Using Bob Ross in Google's DeepDream is as terrifying as you can imagine

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "Google's most sophisticated wizard function finally arrives on the iPhone"data-reactid =" 23 "> The most sophisticated feature of Google Assistant finally arrives on the iPhone

As Chrome security engineer Justin Schuh explained in a series of tweets on Wednesday, this attack is different from previous attacks on Chrome because, instead of targeting Flash, it targets the Chrome code directly.

When Flash was the first exploit of the chain, Google could silently update the Flash plug-in behind the scenes and Chrome automatically switched to the updated plug-in without any user intervention. On the other hand, this day zero exploit requires that the user manually restart the browser. So, even if the update is installed on your system, you must always close and reopen the browser for it to take effect.

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "https://platform.twitter.com/widgets.js"data-reactid =" 28 ">https://platform.twitter.com/widgets.js

The (relatively) good news is that since yesterday Google has "only observed active exploitation against 32-bit Windows 7 systems". Therefore, if you are using Windows 10 (or even Windows 8), you are probably in the same situation. clear. Nevertheless, there is no point in taking risks. So make sure your browser is up to date and, if not, update it today.

<p class = "web-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "Sign up for BGR Bulletin. For the latest news, follow us on Facebook, Twitter, and Instagram. "data-reactid =" 30 "> Sign up for the BGR newsletter For the latest news, follow us on Facebook, Twitter and Instagram.

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "Trend right now:"data-reactid =" 31 ">Trend right now:

  1. Google warns everyone to update their Chrome browser right now

<p class = "canvas-atom canvas-text Mb (1.0em) Mb (0) – sm Mt (0.8em) – sm" type = "text" content = "To see the original version of this article on BGR.com"data-reactid =" 34 ">See the original version of this article on BGR.com

[ad_2]

Source link