Tuesday, April 8, 2025
HomeChromeGoogle Added New Password Leak Detection Feature in Chrome To Alert If...

Google Added New Password Leak Detection Feature in Chrome To Alert If Your Password Ever Been Hacked

Published on

SIEM as a Service

Follow Us on Google News

Google added a new in-built feature in the Chrome browser that alerts you during sign in the non -Google access if your password ever been hacked or it was a part the data breach.

Earlier this year Chrome introduced a password checkup extension in the Chrome web store now Google integrated this extension feature in chrome and name it as “Password Leak Detection”.

Very recently Mozilla added this same feature in chrome with the name of  Firefox monitor that integrated with haveibeenpwned breach database that it let you know the whether your email Address was compromised or not if you enter your email address in the search field.

- Advertisement - Google News

This new feature in chrome not only alert you but also suggest and save strong passwords on particular sites.

Inbuilt Chrome “Password Leak Detection” feature available in the latest Chrome 78 Canary.

Google also integrate this feature with a password manager that alerts you whenever users try to set a weak password and the settings in the Chrome says “ Show a warning when you use an unsafe password that was a part of data breach. It is available for signed-in users only.”

Password Leak Detection
Click to enlarge the Image

You can enable this Password Leak Detection feature in Chrome 78 canary for all the platform including Mac, Windows, Linux, Chrome OS, Android.

You can find the feature in Chrome 78 canary by following these steps that suggested by techdows,

1. Visit chrome://flags

2. Search for “leak” password, for “Password leak detection” experimental feature

Click to enlarge the Image

After enabling the Password leak Detection, Browser requires to reset and the new feature available.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking New updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Over 5,000 Ivanti Connect Secure Devices Exposed to RCE Vulnerabilities

Over 5,000 Ivanti Connect Secure devices remain vulnerable to a critical remote code execution...

CISA Alerts on Actively Exploited CrushFTP Authentication Bypass Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about an...

Over 26,000 Dark Web Discussions Focused on Hacking Financial Organizations

Radware’s comprehensive research into the cybersecurity landscape has uncovered significant trends shaping the financial...

Malicious VS Code Extensions with Millions of Installs Put Developers at Risk

A sophisticated cryptomining campaign has been uncovered, targeting developers through malicious Visual Studio Code...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google to Patch 23-Year-Old Chrome Bug That Leaked Browsing History

Google has announced a groundbreaking update to its Chrome browser that addresses a vulnerability...

Lazarus Adds New Malicious npm Using Hexadecimal String Encoding to Evade Detection Systems

North Korean state-sponsored threat actors associated with the Lazarus Group have intensified their Contagious...

New Credit Card Skimming Campaign Uses Browser Extensions to Steal Financial Data

A newly discovered credit card skimming campaign, dubbed "RolandSkimmer," is exploiting browser extensions to...