Tuesday, March 4, 2025
HomeChromeChrome 76 Released - A new Stable version for Android, Windows, Mac,...

Chrome 76 Released – A new Stable version for Android, Windows, Mac, Linux, and iOS Platforms

Published on

SIEM as a Service

Follow Us on Google News

Google finally released chrome 76, a stable channel that adds media query, bringing a dark mode to websites and several major improvements including the fix for Incognito mode loophole.

Incognito Mode loophole that resides in FileSystem API allowed sites to detect people’s browsing activities, as Google Chrome promised on last week that they will fix in Chome 76, now it’s fixed.

Hereafter websites will no longer be able to force readers to sign up for a subscription after viewing a fixed number of free articles.

Chrome adds PWA Omnibox Install Button which helps users to install Progressive Web Apps on the desktop, by adding an install button to the address bar.

Now Adobe Flash is now turned off by default, but you can manually enable to feature by going to chrome://settings/content/flash

Dark mode feature has been improved and the prefers-color-scheme media query, allows you to adjust the look and feel of your site to match the user’s preferred mode.

According to Google release notes, Chrome 76 contains a number of fixes and improvements — a list of changes is available in the log. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 76.

All the platform desktop users can update to Chrome 76.0.3809.87 by checking here Settings -> Help -> About Google Chrome, you will receive the auto-update.

Android and iOS user can download the new Chrome 76 in the Play Store and App Store.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...