Tuesday, July 23, 2024

Chrome 66 Released with Number of Security Fixes and Starts Distrust Symantec SSL/TLS Certificates

Google announced Chrome 66 to the stable channel for Windows, Mac, Linux, and users started upgrading to the new a version of Chrome 66.0.3359.117 that comes with a number of security fix and improvements.

Chrome 66 Targets Security 

With Chrome 66 site isolation turned on for a small percentage of users to prepare for a broader upcoming launch.

Strict site isolation which allows each website to have a dedicated process isolated from other sites, it was introduced in version 63 but not enabled by default.

Open Chrome.
In the address bar at the top, enter chrome://flags/#enable-site-per-process and press Enter.
Next to “Strict site isolation,” click Enable.
If you don’t see “Strict site isolation,” update Chrome.
Click Relaunch now.
Chrome 66

The massive change is with the certificate that was issued by Symantec before June 1, 2016, those will stop function with Chrome 66 and from Chrome 70 all remaining Symantec SSL/TLS certificates will stop working. Chrome 70 set to be released on Aug 30th, 2018.

Chrome 66

The release includes the fix for 62 security bugs that reported by the security researchers and Google says “bug details and links may be kept restricted until a majority of users are updated with a fix”.

You can find the complete list of changelog here and here for Security Fixes. It includes a number of fixes such as SmartScreen bypass in the download, URL spoof in Navigation, Fullscreen UI spoof and Confusing autofill settings.

From Chrome 66 it begins alerting users if any third party software tries to inject any code in Chrome and asks users to remove the software.

Starting from Chrome 68 which set to release by July 2018 it begins to block the third-party software from injecting into chrome and starting from Chrome 72 this option will be removed and it always block code injection.

Also, they announced safe browsing by default in the WebView starting this April 2018 from the WebView version 66. This means Android app developers using WebView not required to make any protection.


Latest articles

Beware Of Dating Apps Exposing Your Personal And Location Details To Cyber Criminals

Threat actors often attack dating apps to steal personal data, including sensitive data and...

Hackers Abusing Google Cloud For Phishing

Threat actors often attack cloud services for several illicit purposes. Google Cloud is targeted...

Two Russian Nationals Charged for Cyber Attacks against U.S. Critical Infrastructure

The United States has designated Yuliya Vladimirovna Pankratova and Denis Olegovich Degtyarenko, two members...

Threat Actors Taking Advantage of CrowdStrike BSOD Bug to Deliver Malware

Threat actors have been found exploiting a recently discovered bug in CrowdStrike's software that...

NCA Shut’s Down the Most Popular “digitalstress” DDoS-for-hire Service

The National Crime Agency (NCA) has successfully infiltrated and dismantled one of the most...

Play Ransomware’s Linux Variant Attacking VMware ESXi Servers

A new Linux variant of Play ransomware targets VMware ESXi environments, which encrypts virtual...

SonicOS IPSec VPN Vulnerability Let Attackers Cause Dos Condition

SonicWall has disclosed a critical heap-based buffer overflow vulnerability in its SonicOS IPSec VPN....
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles