Lompat ke konten Lompat ke sidebar Lompat ke footer

Hackers attacking Google Chrome — what to do now

Hackers attacking Google Chrome — what to do now

Google Chrome update
(Image credit: Shutterstock)

Google past night (Dec. 13) patched the screen background version of the Chrome browser to fix five security system flaws, including one high-jeopardy "no-twenty-four hour period" vulnerability that's likely already being exploited "in the wild" by attackers. Updates Crataegus laevigata not reach all users instantly.

The new updates take the current interlingual rendition of Chromium-plate on Windows, Mack and Linux to version 96.0.4664.110. Windows and Mac users generally need to merely close and relaunch the web browser to start the update; Linux users may need to wait for their distributions to bundle the patch into regular update cycles. (Humanoid and iOS versions of Chrome suffer separate updates.)

To make sure your Chrome installation is rising to date, click the three vertical dots on the clear satisfactory of the browser window. Mouse down and hover your cursor to Assist, then click About Google Chrome.

A new tab will susceptible that either shows you that your version is with-it, or volition begin a download of the new version if you're on Windows or Mac. If the latter happens, you'll just need to relaunch the web browser.

Some different widely misused browsers that share Chromium-plate's ASCII text file underpinnings, including Microsoft Edge, Brave, Opera and Vivaldi, have not yet been updated to the new version. Microsoft may be ready until its own December Patch Tuesday round of updates are pushed out later today (Dec. 14).

Loss of store

The vulnerability that's already being exploited involves a "use subsequently free" bug in V8, Chrome's JavaScript engine, according to the official Chrome Releases blog stake.

"Employment afterward unfixed" implies that whatever march in V8 is not properly "reverting" its blockade of allocated memory space to Chrome's central monument, creating an chance for a malicious process to seize the memory pulley and hack Chromium-plate from the inside. The breakthrough of the flaw was credited to an anonymous researcher.

The other four flaws involved Chrome graphics interpreting and software libraries. Although those flaws weren't in public unveiled before yesterday, IT's likely that some attackers will try to physique out what the problems are and craft exploits consequently. Google won't reveal the details of each unrivaled for another 30 years.

Google this class has patched at least a dozen flaws in Chromium-plate that counted as "zero days", meaning the flaws were publicly known of and liable exploited before Google had a chance to patch them.

Paul Wagenseil

Paul Wagenseil is a senior editor at Tom's Guide focused along security and secrecy. He has also been a dishwasher, child cook, long-haul number one wood, code imp and video editor. Atomic number 2's been rooting more or less in the info-security space for to a higher degree 15 age at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown dormy in hit-or-miss Tv set news floater and even moderated a panel discussion at the CEDIA internal-applied science conference. You can follow his rants on Chirrup at @snd_wagenseil.

Hackers attacking Google Chrome — what to do now

Source: https://www.tomsguide.com/news/chrome-96-patch-2

Posting Komentar untuk "Hackers attacking Google Chrome — what to do now"