Alert: Google Chrome users are susceptible to hackers, how to prevent it

Google, US multinational tech giant, has released an emergency update for Chrome (99.0.4844.84) for Windows, Mac, and Linux users to address a high-severity zero-day bug.

Google
Google Chrome

The zero-day is a weakness in Chrome’s JavaScript engine that can be used by hackers to inject their code into your browser.

An anonymous security researcher was credited with reporting the bug on March 23, 2022.

According to an update published on its blog, “Google is aware that an exploit for CVE2022-1096 exists in the wild.”

In the stable desktop channel, the 99.0.4844.84 version is already rolling out globally.

The upgrade will be rolled out to all users "in the coming days/weeks," according to the business.

Despite the fact that Google stated that it had detected attacks in the wild leveraging this zero-day, the corporation did not provide technical details or more information about these instances.

In the stable desktop channel, the 99.0.4844.84 version is already rolling out globally.

The upgrade will be rolled out to all users "in the coming days/weeks," according to the business.

Despite the fact that Google stated that it had detected attacks in the wild leveraging this zero-day, the corporation did not provide technical details or more information about these instances.

“Access to bug details and links may be kept restricted until a majority of users are updated with a fix,” Google said.

“We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.”

In the meantime, Chrome users are advised to update the app as soon as possible to prevent attacks.

©Standard Gazette, 2021. Unauthorized use and/or duplication of this material without express and written permission from this site’s publisher is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Standard Gazette with appropriate and specific direction to the original content.
Leave A Reply

Your email address will not be published.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Translate »
Share on Social Media