Google Chrome has worked on a security update that is now available for some users on platforms like Mac, Windows, and Linux. This update addresses vulnerabilities that allow bad actors to steal information from your computers. It’s all for the sake of the chrome browser protection.
Unfortunately, no information can be revealed regarding the exploited attacks. The CVE-2023-6345 is the number of a Common Vulnerabilities and Exposures (CVE) entry where it refers to a cybersecurity vulnerability. It facilitates tracking and communication about vulnerability.
Details can’t be revealed because attackers can use this information for more attacks.
But it is some guesswork
- Code execution: With this code, attackers can access sensitive data like passwords, cookies, and browsing history.
- Data Exfiltration: Attackers target specific individuals or groups to steal their data, such as personal documents and financial records.
- Drive-by downloads: Invaders can embed malicious code in websites or online advertisements. When users visit the targeted sites, the code automatically exploits vulnerabilities, and malware is downloaded onto the users’ systems without their consent.
Critical, Google Said.
Google classified this attack as critical and then released an emergency patch to indicate the severity of the threat. For Google to label these bad actors as critical attackers is something to be cautious of, obviously.
So, what you need to know is the following:
If you have the latest version of the Chrome browser, then you’re good to go. But, if you don’t, then read carefully.
You need to update your Chrome browser automatically by heading to Settings, then to ‘About Chrome’. In case you can’t, you can manually download the latest version from Google’s website.
Google is making sure that everyone has access to the fix. But it might take some time, so it’s going to be rolled out in the coming days or weeks. This means that not everyone will have access to the fix until then.
Everyone should be aware of all the information kept on their computers, like anything confidential, sensitive, or personal. Try not to have a ‘soft copy’ since its consequences can be hard on you! Opt for ‘hard copies’ instead!
Inside Telecom provides you with an extensive list of content covering all aspects of the tech industry. Keep an eye on our Cybersecuritysections to stay informed and up-to-date with our daily articles.