croom new

Patriot Tech Services Inc. Blog

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

Extension Restrictions
While Chrome’s biggest asset is quite possibly its extensive library of add-on extension programs, security concerns that have frequently appeared in these extensions have led Google to pump the brakes a little and impose some new requirements. For instance, with cryptocurrency becoming such a huge topic in recent months, many extensions dedicated to mining and even cryptojacking popped up. Google is now putting the kibosh on these supplemental programs. Furthermore, Google is going to hold developers in general to a higher standard, requiring their accounts to be protected by two-factor authentication and putting those extensions that require extensive permissions, or feature code that is hosted remotely closer under the microscope.

Security Measures
In addition to putting extra restrictions on its extensions, Chrome 70 has a few additional security tricks packed in, including measures meant to foil phishing attacks and protect the end user from their influence. Chrome 70 is also going to push education of its native password management tools. Perhaps most apparent to the end user, instead of confirming that a URL is secure to access, Chrome will warn users when one is not. This makes sense, as it reinforces that more websites should be secure than aren’t.

Login Concerns
Not all of these changes have received such a warm welcome. One change in particular alarmed many users when it appeared. Prior versions of Chrome have allowed users to access Chrome without logging into the browser. However, some users have noticed that Chrome now appears to log a user in, even if they are only using a single service.

The big concern with users here is that Google could possibly now share a user’s data, like their browsing history, something that the previous status quo didn’t require. However, Google has announced that this isn’t an indication that Chrome has been logged in to, it is actually a kind of “in-between” alert to inform a user of which of their accounts are currently logged in.

Of course, as we spend more time with Chrome 70, more things we like will emerge, as well as things we don’t like. If you’ve used Chrome 70, what do you think about it? Share your thoughts in the comments!

A Busy Staff Isn’t Always a Productive Staff
Getting to Know Technology: Link

Comments 1

MarshaEFalls on Friday, 14 December 2018 23:46

Some users are happy and some are unhappy with these changes of google in chrome. If you are buying a term paper you have to idea about the working of these changes and I hope it will better for later.

Some users are happy and some are unhappy with these changes of google in chrome. If you are [url=]buying a term paper[/url] you have to idea about the working of these changes and I hope it will better for later.
Already Registered? Login Here
Saturday, March 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Cloud Google Network Security User Tips Hackers Tech Term Innovation Business Computing Computer Microsoft Productivity Business Management Malware Software Mobile Devices Hardware Efficiency Browser Hosted Solutions Smartphone Email Data Windows 10 Windows 10 Data Backup Upgrade Workplace Tips Internet of Things Smartphones Apps Data Security Business Windows IT Services Communication Miscellaneous Cybersecurity Android Backup VoIP Data Recovery Business Continuity Passwords communications Productivity Office 365 Outsourced IT Mobile Device Management Small Business Best Practice Operating System Cybercrime Spam Holiday IT Support Server Automation Managed Service Provider Users Network Two-factor Authentication Saving Money Networking Information Virtualization Employer-Employee Relationship Gmail Social Media Vulnerability Chrome Google Drive Disaster Recovery Gadgets Microsoft Office Applications User Error Facebook Data Management Health Update Budget Office Bring Your Own Device Phishing Remote Computing Cost Management Bandwidth Law Enforcement Tech Support Government Collaboration Alert Artificial Intelligence Blockchain Money Ransomware Quick Tips Sports Retail Risk Management Hacking Managed IT Services Office Tips Wireless Charging Conferencing Cloud Computing Managed IT Services Cortana Data Breach Marketing Router Managed Service Proactive IT eWaste Wi-Fi Meetings Mobile Device Access Control Travel Evernote Politics Safety Project Management Computers iPhone Devices Apple Save Money Wireless Technology Human Resources Password Streaming Media Going Green Saving Time Telephone Systems VPN The Internet of Things Information Technology Search Hybrid Cloud Social Engineering Mobile Security Social App OneNote Google Docs DDoS Encryption Google Assistant Business Technology Fraud Recovery Application Word Microsoft Word Gamification Managed IT IT Support Accessory File Sharing Websites Avoiding Downtime Antivirus Microsoft Excel Display Identities Software as a Service Distributed Denial of Service Employee Value Mobile Computing Testing Edge Virtual Assistant Running Cable Access BDR Security Cameras Data Privacy IT solutions Windows Ink Maintenance Memory Teamwork Commerce Peripheral Data Theft Storage Trending History Bluetooth Telephony Co-Managed Services Language Patch Management Break/Fix Biometrics Camera Ciminal Alexa for Business Transportation Vendor Management Machine Learning Gifts Hard Drive Google Maps Device Security Financial Files Legislation Computing WiFi Audit Private Cloud PowerPoint Computer Forensics Customer Service Fax Server Uninterrupted Power Supply Mobility Telephone Television Laptop Medical IT Augmented Reality PDF Projects Touchscreen Robot Downtime Credit Cards Chromebook Benefits Entertainment Vendor Firewall Legal Scam Admin Comparison App store Tablets Workers Management Remote Monitoring Hacker Hyperlink Virus Shortcut Touchpad Branding Data Loss Emergency IT budget Data Protection E-Commerce FAQ Printing Employee-Employer Relationship Spyware Bloatware Chromecast Keyboard Shortcuts Specifications Excel WannaCry NFL Updates Wireless Internet Disaster Humor Personal Information Wasting Time Proactive Operating Sysytem Reputation Identity Theft Internet Exlporer Windows 7 Customer Relationship Management Data storage IT Management Payment Cards Charger Amazon Lithium-ion battery Wearable Technology SaaS Administrator Payroll Sales Identity Hosted Solution Worker Commute Best Available SharePoint Unsupported Software Wireless Hiring/Firing Education Adobe Hard Drives Worker Mouse IT solutions WIndows Server 2008 Cameras Managing Stress Instant Messaging End of Support Books Upgrades BYOD Regulations How To intranet Nanotechnology Work/Life Balance Virtual Reality Smart Technology iOS Licensing Twitter Analytics Settings Windows 10s Printer USB Advertising Electronic Medical Records Consultant Current Events Root Cause Analysis Relocation Video Games Cache Save Time Network Congestion Solid State Drive Outlook Printer Server Phone System Battery Near Field Communication HBO Samsung Science Data Storage Computer Fan Thank You Presentation User HaaS Hard Disk Drive Sync Point of Sale CrashOverride Text Messaging Printers Compliance Emails Black Market Training Experience Automobile Screen Mirroring Unified Threat Management Flexibility Employer Employee Relationship Congratulations Computer Care Keyboard Big Data Cleaning Regulation Computer Accessories Webinar Tablet WIndows 7 Company Culture Business Intelligence Music Cast Administration IT consulting Scalability Monitors

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      Virtual assistants have a lot of promise as a productivity tool, so it only makes sense that they would begin to appear in the workplace. Unfortunately, these devices have also gained a reputation as a security risk. Whether or not you’ve considered bringing virtual assistan...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login