Google Chrome Windows Security Risk Issued By Indian Govt For Users: Know More
Google Chrome Windows Security Risk Issued By Indian Govt For Users: Know More
Chrome users on Windows, macOS and even Linux are being warned about a major security issue that needs your attention right away.

Chrome users in India and other countries have got a new security risk alert that promises to put their devices at the risk of hacking. The latest Chrome security warning comes via the Indian Computer Emergency Response Team (CERT-In) with a high severity ranking, which will get millions of Chrome users worried.

The new Chrome security alert focuses on the Windows/macOS and Linux users in the country and the high rating of the issue means people need to give it immediate attention.

Chrome Security Issue July 2024 – What We Know

The security bulletin from CERT-In highlights the issues that exist in the components that make the backbone of Chrome. “These vulnerabilities exist in Google Chrome due to Inappropriate implementation in V8 Type confusion in V8; out of bounds memory access in V8; use after free in screen capture media stream audio and navigation, race condition error in DevTools,” the post explains. In simple words, any attacker can remotely benefit by exploiting these issues to infect the devices.

GOOGLE CHROME VERSIONS Affected

– Google Chrome versions prior to 126.0.6478.182/183 for Windows and Mac

– Google Chrome versions prior to 126.0.6478.182 for Linux

Chrome is available on Windows, Mac and even Linux platforms, which means a large chunk of PC users need to be careful of opening mails and downloading from links.

Chrome Update – How It Works

Once again, to be on the safer side of this issue, users must download the latest available software update for Google Chrome on whichever platform they are on. You can do this by heading over to the three-dot menu on Chrome – Settings – About – Update Chrome.

What's your reaction?

Comments

https://hapka.info/assets/images/user-avatar-s.jpg

0 comment

Write the first comment for this!