Cyber security news for all

More

    Security leak in Chrome speech recognition component

    What exactly makes the Chrome security leak susceptible to external attacks is still covered in detail by Google. However, it is clear that a vulnerability has been addressed in the speech recognition feature. To be able to surf the internet without this vulnerability, you have to install the browser in the latest version, which is now available for download for computers with Windows and Linux. Google has already triggered the update wave for Android devices, and it will soon follow for iOS.

    Restart Your Browser Once For The Software Update

    Now Google has started to provide an update for the Chrome browser, which at first glance does not seem particularly large. Unlike other days, the provision of a single security patch is part of the software update. Google closes a security hole that bears the characteristic critical.

    An automated update process will start on all affected devices over the next few days. A small icon in the top right corner of the browser window prompts you to install the latest browser generation. You can start the download manually on your PC by clicking on the three menu items next to your profile picture, selecting the Help menu item and then clicking Google Chrome. Then the download of the latest available Chrome version starts. You must then restart your browser once for the software update to take effect.

    This market power is important for Google on the one hand to collect user data. As a result, Google can continuously optimize its own services and focus them on user interests. At the same time, the high market share is also a potential threat to global security. Because a dangerous security hole appears in Chrome security leak, millions of users are at risk of being attacked or spied on by hackers.

    Recent Articles

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Vodafone experiences a vulnerability with fatal effects

    The injected JavaScript can access the session cookies from Vodafone website and send them to a server. An attacker can take over the session...

    Maze leaks data on its own platform

    The Maze ransomware has been up to almost a year and a half. This week, security experts warned about the actions of the cyber...

    Emotet to spread the malware behind email archives

    If you find an attached pack to an email these days, you should be particularly careful: the highly developed malware Emotet could be lurking...

    500,000 Activision accounts have been leaked

    Activision has taken a position on the alleged leak. According to the publisher, there has never been a data leak. In some cases it is...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox