facebook linkedin twitter

Computerware Blog

Update Google Chrome, Says Homeland Security

Update Google Chrome, Says Homeland Security

Look, we get it… it’s one thing to hear it from “those IT guys” about how important software updates are. We’re into this stuff, after all, so we worry about things like that more. However, we’re hoping that a warning from Homeland Security to update Google Chrome will have a little more weight.

Yes, that’s right: Homeland Security wants you to update your Chrome browser.

Active Zero-Day Threats Against Chrome

As of this writing, November saw five vulnerabilities patched in the web browser. All five were classified as zero-day threats—a threat that cybercriminals have discovered and put into use before software developers or security researchers are made aware of it. This situation obviously gives the cybercriminal the advantage, making a zero-day threat even more dangerous.

Making this bad situation worse, the last two of these threats were classified as high severity. According to the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA), the vulnerabilities that compose these threats could enable an attacker to take over the system. One, tied to a JavaScript engine, could be used via a phishing attack, while the other is likely a corruption vulnerability in the browser’s features.

Since these vulnerabilities are now being exploited, CISA has been encouraging users to apply the updates to fix these issues.

Why Updates Matter So Much

Let’s frame it like this: if the front door lock of your business suddenly stopped working, would you get it fixed, or just leave it and hope nobody noticed?

These vulnerabilities are parallel to the broken lock, with far too many users deciding to tempt fate and leave them be. In fact, once these vulnerabilities were mitigated via an update, only half of Android users had updated Chrome within a day. Regardless of whether your users are just being negligent or are using an outdated device, these vulnerabilities leave your business exposed.

Computerware can help. Our services are hugely centered around applying such patches and fixes in a timely manner. For this kind of help, along with so much other IT assistance, give us a call at (703) 821-8200.

Two Lessons Businesses Can Learn from the Spotify ...
Windows 10’s Over 70% Market Share is Still Too Lo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 23, 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Managed Service Provider Hosted Solutions Email Productivity IT Services Malware Efficiency Saving Money Google Innovation Small Business Collaboration User Tips Computer IT Support VoIP Data Backup Quick Tips Smartphones Network IT Support Data Recovery Mobile Devices communications Business Continuity Android Microsoft Office Gadgets Disaster Recovery Communication Smartphone Phishing Cybersecurity Social Media Upgrade Mobile Office Server Virtualization Mobile Device Miscellaneous Passwords Ransomware Mobile Device Management Windows Users Managed IT Services Holiday BDR Vendor Management Operating System Apps Tech Term Windows 10 Outsourced IT Internet of Things Unified Threat Management Facebook Remote Monitoring Automation BYOD Apple Mobile Computing Analytics Data Management WiFi Managed IT services Covid-19 Remote Computing Windows 10 Cloud Computing Browser Artificial Intelligence Save Money Marketing Managed Service Training Spam Help Desk The Internet of Things History Firewall Business Technology App Alert Big data Bandwidth Health Encryption Office Information Technology Office 365 Budget IT Consultant Two-factor Authentication VPN Government Content Filtering Networking Cybercrime Wi-Fi Going Green Maintenance Printer Access Control Bring Your Own Device Windows 7 Antivirus Managed IT Hard Drives Blockchain Information Gmail Recovery Healthcare Outlook Windows 8 Employer-Employee Relationship Lithium-ion Battery Best Practice Retail Cost Management Virus Tech Support Wireless Technology Document Management Hiring/Firing Search Remote Work Saving Time Computers Storage iPhone Travel Education Project Management Update Vendor Risk Management IBM Humor Hacking Augmented Reality Computing Conferencing Money It Management Data Security Phone System Patch Management Customer Service Data Loss Avoiding Downtime Laptop Website Twitter Data Breach Intranet Legal Meetings Remote Regulations Applications Value Password Customer Relationship Management Hacker SaaS End of Support Save Time PowerPoint Router Downtime Law Enforcement File Sharing Administration Compliance Voice over Internet Protocol Hard Drive Solid State Drive Proactive IT Data storage Computer Repair Running Cable Wireless Mobility Flexibility Current Events Vulnerabilities Business Growth Employee/Employer Relationship Fax Server Word Cooperation Private Cloud Digital Excel Websites Paperless Office Telephony Cortana Net Neutrality Sports Machine Learning Chrome Telephone Systems Software as a Service Disaster Business Intelligence Hosted Solution Digital Payment Employees Robot Securty Comparison Tablet User Monitoring Virtual Desktop Company Culture Social Google Maps Black Market Social Networking Management Cryptocurrency Social Engineering Scam DDoS Chromebook Redundancy Google Docs Network Congestion How To Memory Hack Experience Managed Services Computing Infrastructure Cleaning Managed IT Service Pain Points Monitors How To Evernote Lifestyle Download Virtual Assistant Office Tips Streaming Media eWaste Smart Devices Processor Start Menu Tech Terms YouTube Microchip Taxes Distribution Mobile Technology Unified Communications Settings Distributed Denial of Service Video Conferencing Processors Gaming Console Uninterrupted Power Supply Solutions USB Vulnerability Professional Services Public Cloud Cost eCommerce Licensing Computer Accessories Webcam Bitcoin Text Messaging Presentation IT service Data Protection Identity Theft Integration Trending Notifications Holidays Specifications Safety Mouse Downloads Bluetooth Time Management Documents Multi-factor Authentication Politics Managed Services Provider Virtual Reality Statistics User Error Display Emails Teamwork Heating/Cooling Programming Co-managed IT Automobile Inbound Marketing Telephone Entertainment Dark Web Network Management Free Resource Motion Sickness Leadership Tip of the week Managing IT Services Point of Contact Webinar Equifax SSID Scalability Adminstration Fleet Tracking Pirating Information Google Calendar Visible Light Communication 2FA Touchscreen PDF News Surveillance Device security Processing Messenger MSP Tracking VoIP IT consulting Telework Health IT IT Desktop Rental Service Finance Wasting Time Best Available Knowledge Keyboard Remote Workers Nanotechnology Logistics Social Network Virtual Machines Consultation Recycling Business Cards Bookmark Service Level Agreement Web Server CIO Virtual Private Network Analytic Startup Asset Tracking Cyber security Cabling Technology Tips Domains Advertising Flash Backup and Disaster Recovery Employer/Employee Relationships Administrator Fake News Staffing Google Wallet Development Product Reviews Google Play Books Username Telephone Service Workers Audit Public Speaking Windows XP FinTech Unified Threat Management Society Best Practives Upselling Gamification Managing Costs Supercomputer Shortcut Displays Data Storage Read Screen Reader Microsoft 365 Customer Resource management Data Warehousing Reviews Piracy Browsers Upload Emergency Entrepreneur Hard Drive Disposal Micrsooft Procurement Smart Tech Medical IT Trend Micro Worker Video Surveillance Access Troubleshooting Microserver Fiber-Optic User Tip Database Proactive Maintenance Saving ZTime Environment Microsoft Excel Drones HTML Security Cameras Reading Threats Samsung HIPAA Computer Care Organization Device Management Windows Server 2008 Communitications Business Managemenet Mobile Security Navigation Virtual Machine Employer Employee Relationship Competition PCI DSS Content Management G Suite Telephone System Google Drive Electronic Payment Shopping Get More Done Software License Data Analysis Hacks Harddrive Trends Physical Security Supply Chain Management Multi-Factor Security Debate Spyware Business Owner Mobile Payment Permissions Language online Currency Turn Key Fraud Printers Banking Tactics SQL Server Botnet Internet Service Provider Printer Server Devices GDPR Relocation GPS Managing Risk Tablets Electricity Printing IP Address AI Human Resources Music IT Assessment Trojan UTM Tech Content Hypervisor Application switches Writing Regulations Compliance External Harddrive Sync Gig Economy LinkedIn IT Plan Fileless Malware Enterprise Resource Planning Hybrid Cloud CCTV Upgrades Remote Working Organize Legislation Error cache Television email scam Proxy Server Business Metrics Addiction Azure Computer Malfunction Thin CLient Accountants Modem Reliable Computing 3D A.I. Strategy Ebay WannaCry LiFi Supply Chains Freedom of Information Electronic Health Records Skype Term Corporate Profile Digital Signature Financial Data Archive Electronic Medical Records Smart Phones Transportation In Internet of Things Work/Life Balance Memes Smartwatch Migration Directions Connected Devices Deep Learning Wireless Headphones Recording Optimization Assessment SharePoint CrashOverride 3D Printing CES Personal Information Capital Financial Productuvuty Managing Stress Regulation

toner1