Categories: ChromeGoogle

Chrome 76 Released – A new Stable version for Android, Windows, Mac, Linux, and iOS Platforms

Google finally released chrome 76, a stable channel that adds media query, bringing a dark mode to websites and several major improvements including the fix for Incognito mode loophole.

Incognito Mode loophole that resides in FileSystem API allowed sites to detect people’s browsing activities, as Google Chrome promised on last week that they will fix in Chome 76, now it’s fixed.

Hereafter websites will no longer be able to force readers to sign up for a subscription after viewing a fixed number of free articles.

Chrome adds PWA Omnibox Install Button which helps users to install Progressive Web Apps on the desktop, by adding an install button to the address bar.

Now Adobe Flash is now turned off by default, but you can manually enable to feature by going to chrome://settings/content/flash. 

Dark mode feature has been improved and the prefers-color-scheme media query, allows you to adjust the look and feel of your site to match the user’s preferred mode.

According to Google release notes, Chrome 76 contains a number of fixes and improvements — a list of changes is available in the log. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 76.

All the platform desktop users can update to Chrome 76.0.3809.87 by checking here Settings -> Help -> About Google Chrome, you will receive the auto-update.

Android and iOS user can download the new Chrome 76 in the Play Store and App Store.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

6 hours ago

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral to…

6 hours ago

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers, following…

6 hours ago

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications,…

6 hours ago

Tycoon 2FA Phishing Kit Uses Advanced Evasion Techniques to Bypass Endpoint Detection Systems

The notorious Tycoon 2FA phishing kit continues its evolution with new strategies designed to slip…

6 hours ago

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity requirements…

10 hours ago