Tuesday, July 16, 2024

Google Chrome 100 Released – Security Fixes, New Logo & More

The all-new Chrome 100 for the Stable desktop channel has been released by Google on March 29th, 2022. The new Google Chrome 100 (100.0.4896.60) includes several new additions like:-

  • A new logo
  • Security improvements
  • Development features
  • Many more

The Chrome 100 is launched for all the following major platforms:-

  • Windows
  • Mac
  • Linux

Apart from Google Chrome 100, Google also promoted the following versions as well:-

  • Chrome 101 as the new Beta version
  • Chrome 102 will be the Canary version

New Developer Features of Chrome 100

In Google Chrome 100, developers have access to new APIs that add functionality to their web apps. The Google Play Store now offers an API for making in-app purchases from web applications.

The new version of Google Chrome 100 offers a new Multi-Screen Window Placement API, which enables web applications to support multi-screen functionality.

Three-digit Version Number Used

User-agent strings, as shown below, are now three-digits instead of two-digits with Google Chrome 100. It has been a purpose of Google to test if altering the Chrome user agent to three-digit ‘Chrome/100,’ as it would break or malfunction the websites since September 2021.

“Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.60 Safari/537.36”

However, Google has strongly urged users to immediately report in case of any unsudden crash occurs after applying the Chrome 100 update or upgrade.

New Icon

There are modest changes to the new Chrome 100 logo in which you can see a larger inner blue circle and the removal of shadows. 

Chrome Canary builds had already tested the new logo, but now that Chrome 100 has been released to Stable builds, it has made its official debut.

This move of Google depicts that it’s one of the modern moves and brand expressions of Google. Moreover, Chrome 100 is a free update with new features and improvements, as well as 28 security vulnerabilities. 

While among all the detected vulnerabilities there are nine vulnerabilities that are rated as ‘High’ severity, making it a crucial update for all users.

Here below we have mentioned all the fixed vulnerabilities:-

  • CVE-2022-1125 (High)
  • CVE-2022-1127 (High)
  • CVE-2022-1128 (High)
  • CVE-2022-1129 (High)
  • CVE-2022-1130 (High)
  • CVE-2022-1131 (High)
  • CVE-2022-1132 (High)
  • CVE-2022-1133 (High)
  • CVE-2022-1134 (High)
  • CVE-2022-1135 (Medium)
  • CVE-2022-1136 (Medium)
  • CVE-2022-1137 (Medium)
  • CVE-2022-1138 (Medium)
  • CVE-2022-1139 (Medium)
  • CVE-2022-1141 (Medium)
  • CVE-2022-1142 (Medium)
  • CVE-2022-1143 (Medium)
  • CVE-2022-1144 (Medium)
  • CVE-2022-1145 (Medium)
  • CVE-2022-1146 (Low)

Want to upgrade your old Chrome, then you have to follow a few simple steps that we have mentioned below:-

  • First of all, you have to go to Settings.
  • Then click on the Help option.
  • After that, you have to select the About Google Chrome option.
  • That’s it, now your browser will automatically check for the new update and install it.

Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles