As the cyber security woes continue to engulf the technology industry, Google has some terrible news for Chrome browser users, whether they use Windows, Mac, or Linux. Attackers are already exploiting a high-impact security vulnerability that might lead to them acquiring control of a system resource or to arbitrary code execution. This is the seventh zero-day attack that Google has had to cope with in 2022.
The recent Google’s CVE-2022-2856 security vulnerability follows in the footsteps of Apple who have also urged all users of its iPhone smartphone and MacBook computer range to download and install the latest security updates, following the discovery of a serious vulnerability that could allow attackers to take complete control of devices.
What is the CVE-2022-2856 Google Chrome Zero-Day?
In an alert published on August 16, Srinivas Sista of the Google Chrome team says that the current Chrome update addresses eleven security issues ranging from moderate to critical severity. The zero-day in question is one of them, CVE-2022-2856. “Google is aware that a CVE-2022-2856 exploit exists in the wild,” Sista said.
There will be little information released regarding the zero-day vulnerability until the majority of users have had opportunity to install and activate the update.
However, Google confirms that CVE-2022-2856 was reported on July 19 by hackers from the Google Threat Analysis Group, Ashley Shen and Christian Resell. According to the alert, this is due to “insufficient validation of untrusted input in Intents.”
What is the CVE-2022-2856 Google Chrome Zero-Day vulnerability
Cyber security is a pressing concern for everyone in the modern world, and Google Chrome users are no exception. A new vulnerability has been discovered that could allow attackers to take control of a system resource or to arbitrary code execution. This is the seventh zero-day attack that Google has had to cope with in 2022, and it’s imperative that all Chrome users update their browsers immediately.
What are the potential risks associated with the Google Chrome vulnerability
By exploiting the CVE-2022-2856 security flaw, an attacker could gain access to a system resource or perform arbitrary code execution. This could potentially lead to the attacker taking control of the device.
How can users protect themselves from attacks that might take advantage of CVE-2022-2856
All Chrome users are urged to update their browsers to the latest version as soon as possible. Google has also released a security update for Android which should be installed immediately. Cyber security is an ever-evolving landscape, and it’s important to stay up-to-date with the latest threats.
What actions should be taken to install the latest security updates for Chrome
To install the latest security updates for Chrome, simply open your browser and go to Settings > About Chrome. Your browser will automatically check for and download the latest updates as Cyber security is a pressing concern for everyone in the modern world, and it’s important to stay up-to-date with the latest threats.
Beyond making sure that your Chrome browser is up-to-date, there are a few other steps you can take to protect yourself from potential attacks. Cyber security is an ever-evolving landscape, and it’s important to stay informed about the latest threats.
While this google chrome threat was discovered and widely reported, GCHQ (the UK’s intelligence agency) reveals that it keeps some software vulnerabilities secret. With so many unreported vulnerabilities, it’s impossible to keep up with all the potential threats. The best defense is a good offense:
– Use strong, unique passwords for every account
– Enable two-factor authentication whenever possible
– Keep your operating system and software up-to-date
– Be cautious about clicking on links or opening attachments from unknown sources
– Use a reputable antivirus program and scan your devices regularly
Until you begin to treat Cybersecurity threats as a constantly evolving phenomenon, it’s important for the cyber security editorial team here at Watchdog to remind you as our readers to always stay vigilant and take steps to protect yourself and your devices. By following the tips above, you can help keep yourself safe from potential attacks.
And, if you can afford, consider installing a reliable anti-virus program and using a secure VPN service when connecting to public Wi-Fi networks.
Taking these extra precautions will help keep you safe as you browse the web. You should make sure that all of your devices connected to your home wifi network have the latest security updates as well.
Once again, make sure that you:
- Install updates for your software and browsers as soon as they become available
- Use strong passwords that are unique to each site
- Enable two-factor authentication where possible
- Be vigilant about opening attachments or clicking on links in emails, even if they appear to be from a trusted source
- Avoid connecting to public Wi-Fi networks unless absolutely necessary
Pixel 4a Review
The Google Pixel 4A currently tops our rank of the greatest Samsung phones available, beating even the pricier iPhone Ultra Max Mega.
So unsurprisingly this is an absolutely fantastic phone. The design isn't massively changed from the previous generation, but most other elements have been upgraded. This is what we call a big boost.
-
Display8.5
-
Performance9
-
Features7
-
Usability8
-
Battery Life10
1 Comment
Pingback: Can you download free apps without a credit card: Untangling the myths in 2023 - Watchdog News Today