Tuesday, January 7, 2025
HomeChromeGoogle Released Chrome 75 for Windows, Mac, Linux and Android with Several...

Google Released Chrome 75 for Windows, Mac, Linux and Android with Several Security Fixes

Published on

Google released Chrome 75 for Android and Stable Channel Update for Windows, Mac and Linux with the fixes of 42 security vulnerabilities that affected the old version of chrome.

In this Chrome 75 for Android, Google improved stability and performance along with Chrome’s built-in password manager to generate a strong and unique password.

Google added several new following features in Chrome 75.0.3770.80 along with security fixes, including two high severity vulnerability.

  1. There’s a new way to reduce latency on canvaselements.
  2. Web apps can now share files to other installed apps using the system level share sheet.
  3. Numeric literals now allow underscores as separators to make them more readable.
  4. Google I/O 2019 is a wrap and all of talks are on our YouTube channel

In Chrome 75, the Web Share API now allows you to plug in the systems share service that provided by the Android OS making us easy to share the file of files including audio files, images, videos, and text documents with other installed apps on the user’s device, watch the below video.

Developers can check out here about all the new features that have been added in this chrome 75 release.

Google already started rolling out, and the update reaches over the coming days/weeks for all desktop platforms Windows, Mac, Linux, and the Android Mobile platform.

Chrome 75 for Android become available on Google Play over the next few weeks and the desktop users now check for the update by going to Settings -> Help -> About Google Chrome in browser and check the auto update.

Out of 42 security vulnerabilities, Two (CVE-2019-5828 and CVE-2019-5829) marked as high severity vulnerabilities which was reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research and Andrew Krasichkov, Yandex Security Team.

“Chrome 75.0.3770.80 contains a number of fixes and improvements — a list of changes is available in the log. Watch out for upcoming  Chrome and  Chromium blog posts about new features and big efforts delivered in 75.” Google said.

The patches can be deployed through Patch Manager plus, where you can pre-built, tested, ready-to-deploy packages for your Enterprise network.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep yourself updated.

Also Read: Unpatched Code Execution Zero-day Vulnerability Founds in Notepad – Google Security Researcher

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New WordPress Plugin That Weaponizes Legit Sites To Steal Customer Payment Data

Cybercriminals have developed PhishWP, a malicious WordPress plugin, to facilitate sophisticated phishing attacks, which...

New FireScam Android Malware Abusing Firebase Services To Evade Detection

FireScam is multi-stage malware disguised as a fake “Telegram Premium” app that steals data...

Hackers Weaponize Security Testing By Weaponizing npm, PyPI, & Ruby Exploit Packages

Over the past year, malicious actors have been abusing OAST services for data exfiltration,...

Hackers Mimic Social Security Administration To Deliver ConnectWise RAT

A phishing campaign spoofing the United States Social Security Administration emerged in September 2024,...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Malicious EditThisCookie Extension Attacking Chrome Users to Steal Data

The popular cookie management extension EditThisCookie has been the target of a malicious impersonation....

Critical Chrome Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Google has released a new security update on the Stable channel, bringing Chrome to...

Cybercriminals Exploit Google Calendar and Drawings in Phishing Campaigns

Attackers are ingeniously exploiting Google Calendar and Google Drawings in phishing campaigns, targeting unsuspecting...