ALL >> Computers >> View Article
Google Chrome Channel Updated To 11.0.696.68, Mitigates Security Vulnerabilities
Recently, Google updated Chrome Channel to 11.0.696.68. The latest version mitigates two high risk vulnerabilities. One of the vulnerabilities is associated with bad casts in Chromium WebKit glue. The release also patched an integer overflow issue in SVG filters. Both the flaws allow remote attackers to execute arbitrary code. The latest version also includes updated Adobe Flash Player (10.3). The update to the stable channel follows an update to the Chrome Beta Channel. Google had recently updated Beta Channel to 12.0.742.30. The latest Beta channel deletes Flash cookies, hardware accelerated 3D Cascading Style Sheets (CSS), integrated Sync, improved screen report and new safe browsing protection among others. Google has been proactive in coming up with security updates. Timely remediation of vulnerabilities could help in safeguarding computers from malware and other malicious attacks.
Software products are prone to vulnerabilities, caused by programming errors. Programming errors may be usually caused by negligence, oversight or false assumptions on the usage and environment. Errors provide opportunity for fraudsters ...
... to bypass authentication, get access to restricted files, escalate privileges, insert erroneous code, steal information and even crash a system. Attackers may misuse vulnerabilities to launch cross-site scripting attack and SQL injection attack. Usually, professionals qualified in IT masters degree and penetration testing identify and mitigate security flaws in software products. In this case, the vulnerabilities were identified by the Google security team. While Google mitigates vulnerabilities frequently, Microsoft fixes security flaws on the second Tuesday of every month.
Internet users must adhere to the security guidelines, update web browsers and other software products regularly. They must configure browser security settings, disable automatic execution of scripts, restrict access to possible forged and untrusted sites, restrict installation of plug-ins and extensions. Organizations may create awareness among employees on latest security threats, information security practices through training sessions, huddle sessions. Employees must be encouraged to undertake online computer degree and e-learning programs to understand and implement safe computing practices.
Security professionals may benefit from online technology degree programs, security conferences and seminars to update themselves on latest happenings in the field of cyber security, latest intrusion detection and prevention mechanisms, and monitoring mechanisms.
Add Comment
Computers Articles
1. How To Build A Peer-to-peer Marketplace?Author: brainbell10
2. How To Build An Api? A Developer’s Guide To Api Platform
Author: brainbell10
3. Everything You Need To Know About Web Development In 2026
Author: chetna
4. Create A Strong Online Presence Today
Author: FutureGenApps
5. User Experience Design
Author: brainbell10
6. Dynamics 365 Hubspot Integration Guide
Author: brainbell10
7. The Thrilling World Of Geometry Dash Lite
Author: Hattie
8. Why Treating All Access, The Same Increases Security Risk
Author: Soham Biswas
9. The Audit Myth In Identity Governance: What Regulators Actually Expect
Author: Soham Biswas
10. Choosing The Right Web Design Company In Westlake For Long-term Success
Author: Compu 360 LLC
11. Unreal Game Development
Author: brainbell10
12. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp
13. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management
14. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify
15. Why Choose Sataware?
Author: brainbell10






