[ad_1]
Hub: allows an attacker to override the buffer and reveal and disclose information
The National Guidance Center for Cybersecurity today issued a warning that it has been classified as “high risk” following an update to the “Google Chrome” browser; Revealing that the warning targets all sectors.
The center said in detail: Google has released an update to fix a number of vulnerabilities in the Chrome browser for Windows, Mac and Linux systems, and here the attacker can exploit the flaws, implement an overflow of buffering, detecting and disclosing information, and executing malware.
The center recommended updating the browser to version 87.0.4280.66; Google has posted an explanation of the necessary update via the link below:
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
The browser supports automatic updating to the latest available version.
Regarding the update method, the National Cybersecurity Guidance Center said: Open Chrome, and at the top left of the screen, click “More” “Help” Google Chrome information and version number Current are the set of numbers under the word “Google Chrome”, and Chrome will check for updates, and it will update Automatic, then hit Restart.
National Center for Cyber Security
“High Risk” … “The National Cyber Security” warns of an update to the “Google Chrome” browser
Sabaq electronic journal
Previously
11/18/2020
The National Guidance Center for Cybersecurity today issued a warning that it has been classified as “high risk” following an update to the “Google Chrome” browser; Revealing that the warning targets all sectors.
The center said in detail: Google has released an update to fix a number of vulnerabilities in the Chrome browser for Windows, Mac and Linux systems, and here the attacker can exploit the flaws and implement an overflow of buffering, detecting and disclosing information, and implementing malware.
The center recommended updating the browser to version 87.0.4280.66; Google has posted an explanation of the necessary update via the link below:
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
The browser supports automatic updating to the latest available version.
Regarding the update method, the National Cybersecurity Guidance Center said: Open Chrome, and at the top left of the screen, click “More” “Help” Google Chrome information and version number Current is the set of numbers under the word “Google Chrome”, and Chrome will check for updates, and it will update Automatic, then tap Restart.
November 18, 2020 – Rabi` Al-Thani 3 1442
11:23 a.m.
Hub: allows an attacker to override the buffer and reveal and disclose information
The National Guidance Center for Cybersecurity today issued a warning that it has been classified as “high risk” following an update to the “Google Chrome” browser; Revealing that the warning targets all sectors.
The center said in detail: Google has released an update to fix a number of vulnerabilities in the Chrome browser for Windows, Mac and Linux systems, and here the attacker can exploit the flaws and implement an overflow of buffering, detecting and disclosing information, and implementing malware.
The center recommended updating the browser to version 87.0.4280.66; Google has posted an explanation of the necessary update via the link below:
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
The browser supports automatic updating to the latest available version.
Regarding the update method, the National Cybersecurity Guidance Center said: Open Chrome, and at the top left of the screen, click “More” “Help” Google Chrome information and version number current are the set of numbers under the word “Google Chrome”, and Chrome will check for updates, and it will update Automatic, then hit Restart.
window.fbAsyncInit = function() { FB.init({ appId : 636292179804270, autoLogAppEvents : true, xfbml : true, version : 'v2.10' }); FB.AppEvents.logPageView(); };
(function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "https://connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));
[ad_2]
Source link