ALL >> Computers >> View Article
Google Chrome Channel Updated To 11.0.696.68, Mitigates Security Vulnerabilities
Recently, Google updated Chrome Channel to 11.0.696.68. The latest version mitigates two high risk vulnerabilities. One of the vulnerabilities is associated with bad casts in Chromium WebKit glue. The release also patched an integer overflow issue in SVG filters. Both the flaws allow remote attackers to execute arbitrary code. The latest version also includes updated Adobe Flash Player (10.3). The update to the stable channel follows an update to the Chrome Beta Channel. Google had recently updated Beta Channel to 12.0.742.30. The latest Beta channel deletes Flash cookies, hardware accelerated 3D Cascading Style Sheets (CSS), integrated Sync, improved screen report and new safe browsing protection among others. Google has been proactive in coming up with security updates. Timely remediation of vulnerabilities could help in safeguarding computers from malware and other malicious attacks.
Software products are prone to vulnerabilities, caused by programming errors. Programming errors may be usually caused by negligence, oversight or false assumptions on the usage and environment. Errors provide opportunity for fraudsters ...
... to bypass authentication, get access to restricted files, escalate privileges, insert erroneous code, steal information and even crash a system. Attackers may misuse vulnerabilities to launch cross-site scripting attack and SQL injection attack. Usually, professionals qualified in IT masters degree and penetration testing identify and mitigate security flaws in software products. In this case, the vulnerabilities were identified by the Google security team. While Google mitigates vulnerabilities frequently, Microsoft fixes security flaws on the second Tuesday of every month.
Internet users must adhere to the security guidelines, update web browsers and other software products regularly. They must configure browser security settings, disable automatic execution of scripts, restrict access to possible forged and untrusted sites, restrict installation of plug-ins and extensions. Organizations may create awareness among employees on latest security threats, information security practices through training sessions, huddle sessions. Employees must be encouraged to undertake online computer degree and e-learning programs to understand and implement safe computing practices.
Security professionals may benefit from online technology degree programs, security conferences and seminars to update themselves on latest happenings in the field of cyber security, latest intrusion detection and prevention mechanisms, and monitoring mechanisms.
Add Comment
Computers Articles
1. Martindale Law Firm Competitive Analysis Data For Legal IndustryAuthor: Den Rediant
2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates
3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors
4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen
5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns
6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs
7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant
8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant
9. Answering_services
Author: brainbell10
10. Api_security
Author: brainbell10
11. Appium
Author: brainbell10
12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant
13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant
14. Adobe_xd
Author: brainbell
15. Amazon Sagemaker Services
Author: brainbell10






