Google Chrome is under attack on Windows and Android. The latest security hole in WebRTC has an exploit that's circulating in the wild, so you don't want to browse without installing the patch. Here's what you need to know. The zero-day security hole involves a buffer overflow in WebRTC, a real-time communication standard supported in all major browsers. It's used for building audio and video communication applications on websites. RELATED Why Are There So Many Zero-Day Security Holes? Google hasn't provided details on the bug and won't do so until a majority of Google Chrome users have installed the security patch. It's classified as "high" severity. It's very possible it could allow a malicious website to take control over your PC. The good news is a fix is already here in the form of Google Chrome version 103.0.5060.114 for Windows and ( Chrome 103.0.5060.71 on Android .) Google Chrome will automatically install updates, but the browser may take up to 24 hours to install them, and Chrome won't automatically restart after installing an update—it will prompt you to restart your browser. In a time when an exploit is circulating online, you don't want to browse without updating. We recommend installing… Read full this story
- Google Closes the Blinds on Windows
- Hackers Having Field Day With IE Zero Day Attacks
- LINUX PICKS AND PANS RoboLinux Smooths the Linux Migration Path
- Microsoft Scrambles to Head Off IE Exodus
- Microsoft releases platform preview of Internet Explorer 10
- Microsoft releases patch for zero-day Flash and Windows Kernel exploit
- Is the Heartbleed bug in your Android? 80 phones/tablets that could be vulnerable
- U.S. govt. advises people to use browsers other than IE after zero-day flaw is revealed
- OPINION What Trump Should Do With Air Force One
- THIS WEEK IN TECH Security, Sanity and Social Networking in the Ranks
Google Chrome Is Under Attack: Update Right Now have 313 words, post on www.howtogeek.com at July 5, 2022. This is cached page on wBlogs. If you want remove this page, please contact us.