4 Ways That Chrome 91 Is Improving Browsing Security

4 Ways That Chrome 91 Is Improving Browsing Security

4 Ways That Chrome 91 Is Improving Browsing Security

MUO

4 Ways That Chrome 91 Is Improving Browsing Security

Browsing security is an essential feature of any browser. Here's four ways that Chrome 91 is improving browsing security. In order to provide you secure and seamless browsing experience, Google constantly upgrades the security features in within Chrome. The latest update, Chrome 91, comes with a bunch of security features that will reduce successful cyberattacks and protect your privacy. Let’s find out how the Chrome 91 update has made internet browsing a safer experience for you.

1 Warning Before Installing Unsafe Extensions

To protect your data, the Chrome Enhanced Safe Browsing feature maintains a list of extensions that are safe to use. With the rollout of these new security features, Chrome will now warn you when you try to install an extension that is not included in its list of trusted extensions. Before any extension download begins, a dialog box will pop up in Chrome, warning you about the potentially unsafe extension. Google's Enhanced Safe Browsing considers extensions developed by developers who follow the Chrome Web Store Developer Program Policies to be trustworthy. According to Google, about 75 percent of the extensions on Chrome Web Store have been uploaded by these trusted developers, and are safe to install.

2 Checking Files Before Downloading

Trying to further ensure security, Google Chrome 91 now performs additional security checks before downloading any file. First, it checks the metadata of the file, including both the contents and source of the file. If the file seems suspicious, a dialog box will pop up to warn you. You’ll also have an option to request a deep scan. During the in-depth analysis, Chrome will scan the file using its static and dynamic analysis classifiers in real-time. After scanning the file, Google will let you know whether the file is safe. You can also choose to download the file, despite the warnings, if it’s coming from a trusted source.

3 DNS-Over-HTTPS for Linux

Previously, Chrome supported DNS-over-HTTPS (DoH) on Windows, Mac, Chrome OS, and Android. However, with the new Chrome 91, Linux users can also enable DoH on their browser. Once you turn this feature on, Chrome will pass all DNS queries through a HTTPS encrypted session. This added privacy feature will prevent any man-in-middle attacks and also provide end-to-end encryption, which will protect your information.

4 NAT Slipstreaming Protection

In a bid to limit NAT Slipstreaming attacks, Chrome 91 has blocked the HTTP, HTTPS, and FTP access to port 10080. NAT Slipstreaming attacks occur when hackers bypass the NAT firewall to access the internal network. This could result in a change in your router configuration, and provide cybercriminals access to your internal network. This step won’t affect the Amanda Backup software or VMware vCentre, if you use either of those, despite using the same TCP port, 10080. It’s also worth mentioning that Firefox already blocked this port back in 2020.

How to Enable Enhanced Safe Browsing in Google Chrome

To enable Enhanced Safe Browsing in Chrome, follow these steps. Click on the More (three-dot) icon in the top-right corner of your Chrome 91 window. Go to Settings. In the Privacy and Security section, click on Security. Below Safe Browsing, check the Enhanced Protection box.

Update Your Browser to Avoid a Zero-Day Exploit

Google's additional security features in Chrome 91 have further fortified the Chrome browser against cyberattacks to make browsing safer for you. Soon after the release of Chrome 91, a number of vulnerabilities were discovered and exploited. These 14 security flaws included a zero-day vulnerability. To mitigate these risks, Google soon released a patch and asked all its users to update their browsers. So if you’re using Chrome 91 and haven’t updated to the 91.0.4472.101 or above version, update your browser at the earliest to protect your device from threat actors.

Share:
0 comments

Comments (0)

Leave a Comment

Minimum 10 characters required

* All fields are required. Comments are moderated before appearing.

No comments yet. Be the first to comment!