DomUpravljanje rizikomGoogle to permit isolated web applications on Chrome access to sensitive USB...

Google to permit isolated web applications on Chrome access to sensitive USB devices

Objavljeno na

spot_img

Google has introduced a new feature that enhances the security of isolated web applications (IWAs). IWAs are applications that are not hosted on live web servers but are packaged into bundles signed by developers and distributed to users through various methods such as platform-specific installation formats like APK, MSI, or DMG.

The move by Google to improve security for IWAs comes as these applications are known for limiting interaction and data sharing between different applications and systems. By operating as isolated entities, IWAs offer benefits such as compromise containment, controlled access and permission, reduced dependency risks, and protection from cross-site scripting attacks.

One notable update from Google is the inclusion of a feature that allows IWAs with permission to use the “USB unrestricted” feature. This enhancement enables IWAs to access USB devices that are typically restricted under the “vulnerable devices” blocklist. With this feature, users can customize the types of USB devices that IWAs can access even when the “USB unrestricted” setting is turned on.

This development is significant as it adds an extra layer of security to IWAs by giving users more control over which USB devices can be accessed by these applications. By allowing customization of device permissions, users can better protect sensitive data and prevent unauthorized access to their devices.

The move by Google to enhance the security of IWAs reflects a growing awareness of the importance of securing web applications in today’s digital landscape. With cyber threats on the rise, it is crucial for developers and users alike to prioritize security measures to safeguard their data and privacy.

In conclusion, Google’s introduction of new security features for isolated web applications underscores the company’s commitment to enhancing cybersecurity for users. By providing tools that empower users to control access to USB devices, Google is taking proactive steps to mitigate potential security risks associated with IWAs. As technology continues to evolve, it is essential for companies to stay ahead of emerging threats and ensure the safety of their users’ data.

Link na izvor

Najnoviji članci

Chinese hackers take advantage of software vulnerability in Cisco systems – Baseline

Chinese hackers have recently been exploiting a software flaw in Cisco products, specifically targeting...

Microsoft discovers critical vulnerabilities in Rockwell PanelView Plus

In a recent development, Microsoft's cybersecurity team has shed light on two significant vulnerabilities...

Gogs Vulnerabilities Allow Attackers to Hack Instances and Steal Source Code

The cybersecurity researchers at SonarSource recently uncovered several vulnerabilities in the popular open-source code...

FedRAMP Introduces Fresh Framework for Emerging Technologies

The U.S. federal government has recently introduced a new framework designed to prioritize emerging...

Još ovako

Chinese hackers take advantage of software vulnerability in Cisco systems – Baseline

Chinese hackers have recently been exploiting a software flaw in Cisco products, specifically targeting...

Microsoft discovers critical vulnerabilities in Rockwell PanelView Plus

In a recent development, Microsoft's cybersecurity team has shed light on two significant vulnerabilities...

Gogs Vulnerabilities Allow Attackers to Hack Instances and Steal Source Code

The cybersecurity researchers at SonarSource recently uncovered several vulnerabilities in the popular open-source code...
hrCroatian