Thursday, December 7, 2023

Chrome 76 Released – A new Stable version for Android, Windows, Mac, Linux, and iOS Platforms

Google finally released chrome 76, a stable channel that adds media query, bringing a dark mode to websites and several major improvements including the fix for Incognito mode loophole.

Incognito Mode loophole that resides in FileSystem API allowed sites to detect people’s browsing activities, as Google Chrome promised on last week that they will fix in Chome 76, now it’s fixed.

Hereafter websites will no longer be able to force readers to sign up for a subscription after viewing a fixed number of free articles.

Chrome adds PWA Omnibox Install Button which helps users to install Progressive Web Apps on the desktop, by adding an install button to the address bar.

Now Adobe Flash is now turned off by default, but you can manually enable to feature by going to chrome://settings/content/flash

Dark mode feature has been improved and the prefers-color-scheme media query, allows you to adjust the look and feel of your site to match the user’s preferred mode.

According to Google release notes, Chrome 76 contains a number of fixes and improvements — a list of changes is available in the log. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 76.

All the platform desktop users can update to Chrome 76.0.3809.87 by checking here Settings -> Help -> About Google Chrome, you will receive the auto-update.

Android and iOS user can download the new Chrome 76 in the Play Store and App Store.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.


Latest articles

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...

Hackers Deliver AsyncRAT Through Weaponized WSF Script Files

The AsyncRAT malware, which was previously distributed through files with the .chm extension, is now being...

BlueNoroff: New Malware Attacking MacOS Users

Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles