croom new

Patriot Tech Services Inc. Blog

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

Extension Restrictions
While Chrome’s biggest asset is quite possibly its extensive library of add-on extension programs, security concerns that have frequently appeared in these extensions have led Google to pump the brakes a little and impose some new requirements. For instance, with cryptocurrency becoming such a huge topic in recent months, many extensions dedicated to mining and even cryptojacking popped up. Google is now putting the kibosh on these supplemental programs. Furthermore, Google is going to hold developers in general to a higher standard, requiring their accounts to be protected by two-factor authentication and putting those extensions that require extensive permissions, or feature code that is hosted remotely closer under the microscope.

Security Measures
In addition to putting extra restrictions on its extensions, Chrome 70 has a few additional security tricks packed in, including measures meant to foil phishing attacks and protect the end user from their influence. Chrome 70 is also going to push education of its native password management tools. Perhaps most apparent to the end user, instead of confirming that a URL is secure to access, Chrome will warn users when one is not. This makes sense, as it reinforces that more websites should be secure than aren’t.

Login Concerns
Not all of these changes have received such a warm welcome. One change in particular alarmed many users when it appeared. Prior versions of Chrome have allowed users to access Chrome without logging into the browser. However, some users have noticed that Chrome now appears to log a user in, even if they are only using a single service.

The big concern with users here is that Google could possibly now share a user’s data, like their browsing history, something that the previous status quo didn’t require. However, Google has announced that this isn’t an indication that Chrome has been logged in to, it is actually a kind of “in-between” alert to inform a user of which of their accounts are currently logged in.

Of course, as we spend more time with Chrome 70, more things we like will emerge, as well as things we don’t like. If you’ve used Chrome 70, what do you think about it? Share your thoughts in the comments!

A Busy Staff Isn’t Always a Productive Staff
Getting to Know Technology: Link
 

Comments 1

MarshaEFalls on Friday, 14 December 2018 23:46

Some users are happy and some are unhappy with these changes of google in chrome. If you are buying a term paper you have to idea about the working of these changes and I hope it will better for later.

Some users are happy and some are unhappy with these changes of google in chrome. If you are [url=https://www.besttermpaper.org/buy-term-papers.html]buying a term paper[/url] you have to idea about the working of these changes and I hope it will better for later.
Already Registered? Login Here
Guest
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Cloud Google Network Security User Tips Hackers Tech Term Computer Business Computing Microsoft Mobile Devices Business Management Hardware Malware Software Efficiency Innovation Data Backup Browser Smartphone Hosted Solutions Windows 10 Data Email Productivity Apps Workplace Tips Windows 10 Smartphones Windows Internet of Things Data Security Business Upgrade Android communications Cybersecurity Data Recovery Mobile Device Management Backup Miscellaneous VoIP Best Practice IT Services Business Continuity Productivity Passwords IT Support Spam Holiday Small Business Operating System Outsourced IT Office 365 Cybercrime Saving Money Network Two-factor Authentication Networking Server Employer-Employee Relationship Managed Service Provider Gmail Applications Automation User Error Communication Virtualization Update Vulnerability Artificial Intelligence Money Data Management Budget Information Office Cost Management Phishing Remote Computing Tech Support Bandwidth Government Chrome Users Collaboration Microsoft Office Alert Blockchain Ransomware Google Drive Disaster Recovery Law Enforcement eWaste OneNote Google Docs Cortana Facebook Going Green Proactive IT Word Managed Service Data Breach Encryption Information Technology Managed IT Services Health Computers Social Media Apple Password Quick Tips Evernote Access Control Project Management Streaming Media Devices Bring Your Own Device Wireless Technology Human Resources Telephone Systems VPN Managed IT Services Social Travel Router The Internet of Things App Mobile Device Saving Time DDoS Mobile Security Social Engineering Wi-Fi Marketing Politics Sports Google Assistant Fraud Safety Application Recovery Risk Management Hacking iPhone Retail Gadgets Business Technology Wireless Charging Office Tips Edge Emergency Virtual Assistant IT solutions Firewall Conferencing Data Privacy Bluetooth Telephony Accessory Search Maintenance Memory Storage Transportation Data Theft Display Meetings Files Security Cameras Personal Information Language Private Cloud Testing SaaS Reputation Identity Theft Peripheral Ciminal Alexa for Business Television Laptop Managed IT Gifts Hard Drive Fax Server Uninterrupted Power Supply Device Security Financial WiFi Humor Robot Microsoft Excel Legislation Computing Benefits Co-Managed Services Computer Forensics Save Money Machine Learning Windows Ink Customer Service Camera Touchpad Cloud Computing Commerce Credit Cards Chromebook IT Support Comparison App store BDR Branding Antivirus Telephone Patch Management Workers Management Shortcut Chromecast Google Maps Virus Projects Admin Audit IT budget Operating Sysytem Vendor FAQ Printing Mobile Computing Disaster Spyware Hybrid Cloud Excel Data storage Specifications Vendor Management Bloatware Internet Exlporer Hyperlink Updates Wireless Internet Wearable Technology Administrator Augmented Reality Proactive Hosted Solution Touchscreen Keyboard Shortcuts Tablets Mobility Avoiding Downtime Employee-Employer Relationship Charger Customer Relationship Management Biometrics PDF Amazon Distributed Denial of Service Remote Monitoring Sales Identity Lithium-ion battery PowerPoint Wasting Time Microsoft Word Gamification Running Cable Access Data Loss File Sharing Legal Websites Scam Windows 7 Data Protection Teamwork Payroll WannaCry NFL Identities Hacker Software as a Service Trending History Value Text Messaging intranet Computer Care Black Market Training Thank You Presentation Experience Flexibility Employer Employee Relationship Virtual Reality Webinar IT Management Monitors Keyboard Analytics Cast Twitter Adobe Cleaning Unified Threat Management Unsupported Software Company Culture Congratulations Music Scalability Big Data IT solutions WIndows Server 2008 Network Congestion Nanotechnology Wireless Hiring/Firing Tablet WIndows 7 Upgrades BYOD Worker Commute iOS Licensing Worker Science Administration IT consulting Instant Messaging Business Intelligence End of Support Books Settings How To Windows 10s Work/Life Balance Downtime Root Cause Analysis Smart Technology User Cameras Managing Stress Consultant Compliance Regulations USB Advertising Electronic Medical Records Cache Current Events Solid State Drive Outlook Relocation Video Games Printer Printers HBO Computer Fan Save Time Regulation Data Storage Battery Computer Accessories SharePoint Hard Disk Drive Sync Samsung Entertainment Education CrashOverride Best Available Printer Server Phone System Emails Near Field Communication HaaS Hard Drives Automobile Screen Mirroring Point of Sale Mouse

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      It is remarkable how much trust people have in Internet-based companies. Not just that they will fulfill the expectations placed on them, but that people routinely provide extremely sensitive information to these companies without thinking for a second about what they do wit...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at www.patriot-techs.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login