342

Hackers often target large companies or institutions. One of the main targets these people prefer for attack is undoubtedly the technology giant. Google. The company has been issuing consecutive warnings against the increasing hacker activities recently.

The company has posted on its blog in the last two months. fourth emergency code warning published. The vulnerabilities mentioned in this warning concern 2 billion Google Chrome users. Windows, macOS and Linux users are all affected.

Google announced that they found 7 vulnerabilities

According to a new article shared on the company’s blog, Google is fully 7 high risk vulnerabilities detected. The company did not give much details about the security vulnerabilities in order to keep the damage that its users may see to a minimum and “not to guide the thief”, as the public put it. The statement was mostly aimed at stating that they were aware of this situation.

From these vulnerabilities V8 errors points directly to the open source JavaScript code at the core of Chrome. WebRTC, on the other hand, is known as the name of the technology to transfer audio and video between the browser and mobile devices. ANGLE

The feature called is Google’s cross-platform graphics engine genealogy tool, which is also open source. Other bugs include printing and plug-ins.

How can we protect ourselves from these vulnerabilities?

All of these vulnerability types are available to hackers. opportunity to take control of computers previously known to offer. The last Zero-Day Vulnerability that Google was having trouble with (the one hackers used before Google discovered it) was also caused by a V8 issue.

In your Google Chrome browser Settings > About Chrome you can see the version of your browser when you follow the path. If you are using version 92. 0. 4515. 159 or later, these issues will not affect you. If you are using an older version, you need to update and restart your browser.


Like it? Share with your friends!

342
Michael Lewis

0 Comments

Your email address will not be published. Required fields are marked *