Share

Related Stories

  • Google Blocks PHP.net – Claims it Serves Malware
    Google's Safe Browsing Tool, used by Chrome, Firefox and Safari to protect users from sites serving malware, yesterday blocked php.net, home of the hugely popular open-source PHP programming language.
  • Google Chrome Opens Up Personal Information to Hackers
    Google Chrome has been shown to have a major security flaw: any consumer who has ever typed in personal information while using the Google Chrome browser, be it for e-commerce or to sign up for newsletters, should be aware that this information is saved to their hard drives, unencrypted.
  • Google implements Chrome app scanning for G+ developer site
    Google is implementing the “Enhanced Item Validation” process, which applies new security measures for applications submitted as part of the G+ developers program for the Chrome browser.
  • Chrome Vulnerable to Camjacking
    Camjacking is clickjacking aimed at taking over the PC’s webcam – and although Adobe fixed the Flash vulnerability that allows it back in 2011, it lives on in the Flash implementations of Chrome and (not verified) IE10.
  • Browsers’ ability to block malware downloads analyzed and compared
    The five leading browsers – Chrome, Firefox, Internet Explorer, Safari and Opera – were tested against 754 samples of real-world malicious software. The results show a marked difference in the browsers’ ability to act as a first line of defense against malware.

Top 5 Stories

News

Chrome Adds Auto-blocking for Malware

05 November 2013

Google is revamping its Chrome browser to layer in an extra security perk: automatic blocking of malware downloads.

Online criminals have been increasing their use of malicious software that can silently hijack browser settings; and Google said this has become a top issue in the Chrome help forums.

In the Canary build of Chrome, any malware Google detects will be flagged and blocked. Users will see a notification message in the download tray at the bottom of their screen, at which point they can click “Dismiss” to clear the alert.

Laying out the standard malware M.O., the company explained what it looks to block: “Bad guys trick you into installing and running this kind of software by bundling it with something you might want, like a free screensaver, a video plugin or – ironically – a supposed security update,” said Linus Upson, Google vice president, in a blog. “These malicious programs disguise themselves so you won’t know they’re there, and they may change your homepage or inject ads into the sites you browse. Worse, they block your ability to change your settings back and make themselves hard to uninstall, keeping you trapped in an undesired state.”

Upson didn’t specify how Google is identifying malicious downloads, or what signature libraries it cross-references.

Other security enhancements include the ability to "reset browser settings" with a button added in the “Advanced Settings” section of last Chrome update, so users can return the browser to a factory-fresh state. And, Google noted that it already flags 10,000 new websites per day with its “Safe Browsing” functionality, which also detects and blocks malicious downloads.

“In some ways, it's safer than ever to be online – especially if you use Chrome,” Upson said. “With continued security research and seamless automatic updates, your browsing experience is always getting better and more secure. Keeping you secure is a top priority, which is why we’re working on additional means to stop malicious software installs as well.”

This article is featured in:
Application Security  •  Internet and Network Security  •  Malware and Hardware Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×