Categories: Chrome

Google Added New Password Leak Detection Feature in Chrome To Alert If Your Password Ever Been Hacked

Google added a new in-built feature in the Chrome browser that alerts you during sign in the non -Google access if your password ever been hacked or it was a part the data breach.

Earlier this year Chrome introduced a password checkup extension in the Chrome web store now Google integrated this extension feature in chrome and name it as “Password Leak Detection”.

Very recently Mozilla added this same feature in chrome with the name of  Firefox monitor that integrated with haveibeenpwned breach database that it let you know the whether your email Address was compromised or not if you enter your email address in the search field.

This new feature in chrome not only alert you but also suggest and save strong passwords on particular sites.

Inbuilt Chrome “Password Leak Detection” feature available in the latest Chrome 78 Canary.

Google also integrate this feature with a password manager that alerts you whenever users try to set a weak password and the settings in the Chrome says “ Show a warning when you use an unsafe password that was a part of data breach. It is available for signed-in users only.”

Click to enlarge the Image

You can enable this Password Leak Detection feature in Chrome 78 canary for all the platform including Mac, Windows, Linux, Chrome OS, Android.

You can find the feature in Chrome 78 canary by following these steps that suggested by techdows,

1. Visit chrome://flags

2. Search for “leak” password, for “Password leak detection” experimental feature

Click to enlarge the Image

After enabling the Password leak Detection, Browser requires to reset and the new feature available.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking New updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a…

7 hours ago

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application websites,…

7 hours ago

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…

1 day ago

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…

1 day ago

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…

2 days ago

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…

2 days ago