Skip to main content

Google Chrome Hacked, Issues Warnings to Its 2.6 Billion Users to Update Their Browsers.



Chrome’s 2.6 billion users again need to be on high alert (for the second time in a week), because Google has confirmed multiple new High-level hacks of the browser.


Google, Google Chrome, Chrome browser, Chrome update, Chrome privacy, Chrome security, Chrome upgrade, Chrome latest version

Four ‘High’ level threats have been found in[+]


Coming just days after Chrome’s 12th and 13th ‘zero day’ exploits of the year were discovered, Google has published a new blog post revealing four ‘High’ rated vulnerabilities have been confirmed. And users need to take immediate action. 



As is standard practice, Google is currently restricting information about these hacks to buy time for Chrome users to upgrade. Consequently, we only have the following information to go on: 


High – CVE-2021-37977 : Use after free in Garbage Collection. Reported by Anonymous on 2021-09-24

High – CVE-2021-37978 : Heap buffer overflow in Blink. Reported by Yangkang (@dnpushme) of 360 ATA on 2021-08-04

High – CVE-2021-37979 : Heap buffer overflow in WebRTC. Reported by Marcin Towalski of Cisco Talos on 2021-09-07

High – CVE-2021-37980 : Inappropriate implementation in Sandbox. Reported by Yonghwi Jin (@jinmo123) on 2021-09-30


While we don’t learn a lot from these descriptions, it is interesting to see Chrome continues to be targeted with ‘Use-After-Free’ (UAF) exploits. The browser was hit by double-digit UAF attacks in September and hackers have already exploited a zero-day UAF flaw in Chrome this month, ahead of the latest discovery. 


The listing of a pair of Heap buffer overflow exploits is less expected. Like UAF attacks, this is a memory vulnerability (also known as Heap Smashing) but it has not been a regular avenue for Chrome hacks in recent months. Memory on the heap is dynamically allocated and typically contains program data. With an overflow, critical data structures can be overwritten which makes it an ideal target for attacks. 


In response, Google has released a critical update. The company does warn Chrome users that the rollout will be staggered, so not everyone will be able to protect themselves immediately. To check if you are protected navigate to Settings > Help > About Google Chrome. If your Chrome version is 94.0.4606.81 or higher, you are safe. If the update is not yet available for your browser, make sure you check regularly for the new version. 


Google, Google Chrome, Chrome browser, Chrome update, Chrome privacy, Chrome security, Chrome upgrade, Chrome latest version

To be safe, Chrome must be restarted after [+]

GOOGLE


And when you have updated, remember the crucial final step: Chrome is not safe until it is restarted. Which makes this a two-way process. Google can fast track fixes for Chrome hacks, but unless users restart their browsers after updating they will not be protected. This false sense of security is something hackers count on. Go check your browser now.

Comments

Popular posts from this blog

How to Host a Website for Free From Your PC or Laptop.

Why pay for a web hosting service when your old computer can do the same thing? Learn how to self-host your site. If you're planning to launch a website but don't want to pay recurring monthly or annual hosting fees, you can use any old laptop or desktop PC to host a website for free. It's a great way to utilize your old system instead of throwing it away. In this guide, we will install and set up services on our 10-year-old laptop to host a WordPress, Joomla, or custom HTML or PHP-based website with a free SSL certificate. MAKEUSEOF VIDEO OF THE DAY Things You Will Need to Host a Website Following are the pre-requisites to host a website for free from home with just your computer: An old laptop or PC running Ubuntu Server. A registered domain name for your website Ethernet cable to connect the laptop or PC to router for reliable and fast connection Step 1: Update and Upgrade the Packages After  installing Ubuntu Server on your computer , execute the following c...

We Bring You Brief Series of Sanctions Against Uganda Government Officials.

📸: Gen Abel Kandiho. On 9-December-2021, USA slapped sanctions against the then CMI Commander Gen Abel Kandiho. 📸: Gen Kale Kayihura. On 9-December-2022, UK slapped sanctions against former Police Boss Gen Kale Kayihura. 📸: Commissioner General of Prisons, Johnson Byabashaija. Again on this 4-December-2023, the same USA has slapped sanctions against Uganda Prisons Commander Johnson Byabashaija over alleged torture and human rights abuses in Prisons across Uganda. We ask, has USA and UK made December as an LCM to slap sanctions against high ranking government officials in Uganda even when the sanctions just remain on paper without deeper investigations to ascertain logical conclusions or remedy to that effect ?. #iip_updates  #Information_is_Power  #we_inform_the_uninformed

UGANDA ELECTORAL COMMISSION TO ELIMINATE NATIONAL IDENTIFICATION CARDS (IDs) FOR 2021 GENERAL ELECTIONS.

The elimination of using National IDs (Ndagamuntu) for the 2021 elections should not have come as a surprise. One would be very NAIVE to think that Bobi Wine has not prepared for this in his Business Plan under the RISK section. It is public knowledge that our EC is not independent.  It is also public knowledge that Military Dictator Yoweri Museveni will never lose an election. What stunned us this morning is when we noticed that on social media, people were mocking Bobi with his "get your Ndagamuntu".  We are on record for saying to all Our readers that the National ID is like Apartheid in South Africa. Students of History would know how those IDs were being used to arrest people, deny them jobs, deny them basic services. Consequently, Bobi was not wrong and will never be wrong on the Ndagamuntu. Except the ones attacking him and mocking him forget that in Uganda, now, no National ID (Ndagamuntu), no service.  If you have not been denied registering your child i...