PROTECT YOURSELF FROM THE RISKS OF CHROME AND EDGE
Dependable and ubiquitous browsers such as Microsoft Edge and Google Chrome are both at risk, but is there a way to protect yourself from attacks? Let us look into it.
All Chrome-related browsers have been compromised and attacked. The users on the internet should know that they need to be extra-attentive nowadays on the internet. There has been another security breach in browsers such as Microsoft Edge, Google Chrome, etc., and a possible repair does not seem to be likely.

The security flaw has been unveiled on Twitter by a user, who calls himself a security researcher and goes by the name Rajvardhan Agarwal, who revealed a picture, which showed a web page launching a calculator. In simple words, he illustrated with the image that it is possible to remote control the PC by launching the calculator app.
He called the event “Chrome Zero Day” as he showed the flaw to his followers.
Rajvardhan Agarwal also shared a link to a GitHub page from where you can proceed to download the copy of the hack. It is a type of concept exploit, a kind of a very primitive or somewhat benign hack that any user can attempt at his home.
A website Bleeping Computer got excited and repeated the attempt to show the flaw. The video is available on the internet, and you can check it out right now.
In one of the earlier tweets, the man who exposed this benign vulnerability, Rajvardhan Agarwal, named this exploit as a “zero-day” flaw. He thought he attempted a zero-day attack as well, but prima facie, he is not technically correct as two other researchers had already discovered the spot and tried the security breach at an event called the “Pwn2Own hacking contest,” which was organized last week itself.
If you have an active user of Microsoft Edge or Google Chrome, you don’t have to sweat this flaw out way too much as the security breach will not work on its own because all the browsers based on Chromium are “sandboxed,” which means that such exploits which attack the browser will not seep into the Windows, Linux, or macOS system on which the user is working, and the browser is running. However, it never harms to be extra-attentive.
In other words, you can understand the Chromium “sandbox” as a sort of shield that guards your system in the case of a security breach, so even if Rajvardhan Agarwal has found a flaw in the operations of these browsers, the exploits will not be able to steal your data.
As per the current scenario, nobody has shown any evidence that these exploits work on mobile devices as well.
It is also imperative to remind ourselves that we are talking about Chromium browsers from the very beginning. There are non-chromium browsers such as Mozilla Firefox and Apple Safari on which the exploits will not run.
In order to have this exploit work on a particular system, it is essential to disable the browser sandbox, which any user can do so manually. If you want to try in Windows, you just need to copy the file destination path in the command line window with a prefix called “no-sandbox–.” Once you do that, a new Google Chrome window will emerge on the screen, and this time around, there will be no sandbox protection for this particular window.
You should also keep in mind that there is dangerous software available on the system that can quickly turn off your sandbox from a remote location and then use this exploit to steal your data or corrupt your files.
So, it is absolutely imperative to shield your system with efficacious and sophisticated antivirus software such as Norton, Webroot, Bitdefender, Kaspersky to keep your system protected at all times.
I am extremely passionate about blogging, running websites, and creating content. I have managed to turn my passion into a profession, and blogging has managed to teach me a lot about technology and myself. I write blog posts, instruction manuals, news releases, and technical descriptions, and reviews for many websites such as office.com/setup
Source: PROTECT YOURSELF FROM THE RISKS OF CHROME AND EDGE
Comments
Post a Comment