DomUpravljanje rizikomGoogle to permit isolated web applications on Chrome access to sensitive USB...

Google to permit isolated web applications on Chrome access to sensitive USB devices

Objavljeno na

spot_img

Google has introduced a new feature that enhances the security of isolated web applications (IWAs). IWAs are applications that are not hosted on live web servers but are packaged into bundles signed by developers and distributed to users through various methods such as platform-specific installation formats like APK, MSI, or DMG.

The move by Google to improve security for IWAs comes as these applications are known for limiting interaction and data sharing between different applications and systems. By operating as isolated entities, IWAs offer benefits such as compromise containment, controlled access and permission, reduced dependency risks, and protection from cross-site scripting attacks.

One notable update from Google is the inclusion of a feature that allows IWAs with permission to use the “USB unrestricted” feature. This enhancement enables IWAs to access USB devices that are typically restricted under the “vulnerable devices” blocklist. With this feature, users can customize the types of USB devices that IWAs can access even when the “USB unrestricted” setting is turned on.

This development is significant as it adds an extra layer of security to IWAs by giving users more control over which USB devices can be accessed by these applications. By allowing customization of device permissions, users can better protect sensitive data and prevent unauthorized access to their devices.

The move by Google to enhance the security of IWAs reflects a growing awareness of the importance of securing web applications in today’s digital landscape. With cyber threats on the rise, it is crucial for developers and users alike to prioritize security measures to safeguard their data and privacy.

In conclusion, Google’s introduction of new security features for isolated web applications underscores the company’s commitment to enhancing cybersecurity for users. By providing tools that empower users to control access to USB devices, Google is taking proactive steps to mitigate potential security risks associated with IWAs. As technology continues to evolve, it is essential for companies to stay ahead of emerging threats and ensure the safety of their users’ data.

Link na izvor

Najnoviji članci

New Zealand Fitness Retailer Targeted by DragonForce Ransomware

The DragonForce ransomware group, known for using locker malware based on the leaked LockBit...

Improving Team Meetings through Hacking

In the world of note-taking and meeting management, the use of technology continues to...

99% of IoT exploitation attempts are based on already known CVEs

The proliferation of Internet of Things (IoT) devices has led to a slew of...

Experts say cybercrime groups are reorganizing following significant crackdowns

Cybercrime gangs are facing a challenging year, as recent global police operations have significantly...

Još ovako

New Zealand Fitness Retailer Targeted by DragonForce Ransomware

The DragonForce ransomware group, known for using locker malware based on the leaked LockBit...

Improving Team Meetings through Hacking

In the world of note-taking and meeting management, the use of technology continues to...

99% of IoT exploitation attempts are based on already known CVEs

The proliferation of Internet of Things (IoT) devices has led to a slew of...
hrCroatian