Update Google Chrome Windows, Linux and Mac 2020


google chrome

On October 23, the stable version of Google Chrome 78 was launched. This came with the possibility of forcing the dark mode on any website and other improvements, in addition to closing several security holes. However, the company has been quick to launch an urgent update for this version of its browser. This is because they have found two very serious vulnerabilities that are being exploited by cybercriminals to attack users. For all this, run and update Google Chrome as soon as possible. Google Chrome 78 is the latest version of the browser available for Windows, Linux, and Mac, in addition to iOS and Android. Among its novelties, we have improvements in the New tab section, the possibility of forcing the dark mode of the websites through the menu of experiments (chrome: // flags), new information when hovering over the tabs (Tab Hover Cards) or improvements in integration with Google Drive. At the security level, 37 vulnerabilities were corrected in this version, including one that allowed URL spoofing in the browser (CVE-2019-13701). Google paid a whopping $ 36,000 for those responsible for discovering the vulnerabilities. However, that was not enough and now they have had to launch an urgent update for Google Chrome for two very serious vulnerabilities.
google chrome

Upgrade to Google Chrome 78.0.3904.87 now to avoid possible attacks

Google has just launched Chrome 78.0.3904.87 for all users with Windows, macOS, and Linux. This is an urgent and very important update since it closes two security holes considered as very serious. This patch has been released urgently and all users should update as soon as possible. The problem is that one of the two critical vulnerabilities is being exploited by cybercriminals to attack users. Although Google has not disclosed technical data of the vulnerabilities for obvious reasons (prevent attacks from increasing), they have confirmed that one of them affects Chrome’s audio components (CVE-2019-13720) and the other to the library PDFium (CVE-2019-13721). Both are of the use-after-free (UAF) type. These allow an attacker access to memory after it has been released. This may cause the program to fail, allow arbitrary code execution or enable full remote code execution. Therefore, they are considered high severity and the recommendation is to update as soon as possible.

Google Chrome 78 

The vulnerability that is being exploited to attack the browser is related to Chrome’s audio components (CVE-2019-13720) and was reported by researchers Anton Ivanov and Alexey Kulaev of Kaspersky. At the moment, more details about the attacks, their amount or what group of hackers could be behind are unknown. Second security update for Google Chrome 78 in less than two weeks. This version was released to the stable branch on October 23 with some news, changes, and corrections. However, last week they had to launch a security update for this version that closed two serious security holes, one of them being “taken advantage of” by cybercriminals to attack users. As if that were not enough, now Google Chrome is updated again to close 4 security breaches and we give you all the keys below. Google Chrome 78 has been available for a few days for Windows, Linux, and Mac, as well as iOS and Android. This version has some new features such as improvements in the New tab section, the possibility of displaying the websites in Chrome mode using the experiments menu (chrome: // flags), more information on the tabs when hovering over the mouse or improvements to the level of integration with Google Drive. This update closes 4 security breaches. Access to these vulnerabilities and their details has been restricted by Google. This will be done until most users have updated to the latest version. They will also restrict access to details about another error in a third-party library that has not been fixed with this update. Therefore, it is better to update Google Chrome 78.0.3904.97 as soon as possible to avoid being a victim of possible attacks due to the existence of these four security breaches.

Leave a Reply

Your email address will not be published. Required fields are marked *