If you’re one of Google Chrome’s billions of users, there are two warnings you should take seriously…
New warning issued to billions of Chrome users
The first of these warnings affects Chrome desktop users on Windows and Mac. Google has just confirmed a security update that includes at least three high-severity fixes for the types of vulnerabilities that have been exploited in the past.
Two of the three vulnerabilities are related to Chrome’s JavaScript and WebAssembley engines and could allow “a remote attacker to exploit object corruption via a crafted HTML page.” Again, there is no indication yet that it will be exploited in the wild, but the information is public and subject to change.
Another fix is for the use-after-free issue. This means that an attacker may be able to use latent pointers to route to memory after it is freed, but there is a risk that the platform or device may become unstable and introduce other vulnerabilities. There is a gender.
Google will not publicly release details of the security issue at this early stage “until the majority of users have been updated with the fix.” Still, details may not be made public if the malicious software is widely deployed on other systems.
It is important for users to update their regular updates now or as soon as possible. Although the details are being withheld, even if the details are sparse, once a vulnerability is identified, it can be exploited to take advantage of the fact that many users are not updating their software quickly enough. There is a risk that
The second warning is very different and affects Android users. Another rogue Chrome analog has been caught in the wild. The Trojan “masquerades as Google Chrome and leverages the popularity and trust associated with Chrome to trick users into downloading and installing it.” The team at G Data says the software is an email and messaging platform. It states that it is advertised through.
This is not available on the official Play Store. Users are directed to other sites or downloads. Already this year, we’ve seen examples of Chrome analogues being used to push malicious apps. This example “mimics the Chrome icon and is virtually indistinguishable from the actual app, except for the black outline of the logo.”
New malware tricks users into granting privileges
The malware, named ‘Mamont’, is designed to steal information from users by tricking them into providing contact and credit card details by claiming to have received a prize.
This particular campaign appears to be targeting users in Russia, but the warning applies to all users. Don’t install apps from random third-party stores or grant permissions to apps like SMS or phone dialer unless the app logically requires it and the app itself comes from a highly trusted source Please.
Google’s Play Protect protects you from such copycats, even if they’re not installed from your own Play Store. You need to make sure it is enabled. But even so, you can’t rely on it without taking sensible steps to protect your devices and data from malicious attackers.
Here are five golden rules. These must be followed.
- Please use the official app store. Don’t use third-party stores and don’t change your device’s security settings to allow apps to load.
- Check the developer in the app description. Is the developer someone you admire? Then check the reviews to see if they are genuine or fake.
- Don’t give permissions to apps you don’t need. Flashlights and stargazing apps don’t require access to your contacts or phone. Also, never grant accessibility permissions that facilitate device control unless necessary.
- I never have Until now Click the link in the email or message to download the app or update directly. Always use the app store for installations and updates.
- Don’t install apps that link to established apps like WhatsApp unless you know they’re legitimate. Check out reviews and what people are saying online.