КућаУправљање ризицимаGoogle to permit isolated web applications on Chrome access to sensitive USB...

Google to permit isolated web applications on Chrome access to sensitive USB devices

Објављено на

spot_img

Google has introduced a new feature that enhances the security of isolated web applications (IWAs). IWAs are applications that are not hosted on live web servers but are packaged into bundles signed by developers and distributed to users through various methods such as platform-specific installation formats like APK, MSI, or DMG.

The move by Google to improve security for IWAs comes as these applications are known for limiting interaction and data sharing between different applications and systems. By operating as isolated entities, IWAs offer benefits such as compromise containment, controlled access and permission, reduced dependency risks, and protection from cross-site scripting attacks.

One notable update from Google is the inclusion of a feature that allows IWAs with permission to use the “USB unrestricted” feature. This enhancement enables IWAs to access USB devices that are typically restricted under the “vulnerable devices” blocklist. With this feature, users can customize the types of USB devices that IWAs can access even when the “USB unrestricted” setting is turned on.

This development is significant as it adds an extra layer of security to IWAs by giving users more control over which USB devices can be accessed by these applications. By allowing customization of device permissions, users can better protect sensitive data and prevent unauthorized access to their devices.

The move by Google to enhance the security of IWAs reflects a growing awareness of the importance of securing web applications in today’s digital landscape. With cyber threats on the rise, it is crucial for developers and users alike to prioritize security measures to safeguard their data and privacy.

In conclusion, Google’s introduction of new security features for isolated web applications underscores the company’s commitment to enhancing cybersecurity for users. By providing tools that empower users to control access to USB devices, Google is taking proactive steps to mitigate potential security risks associated with IWAs. As technology continues to evolve, it is essential for companies to stay ahead of emerging threats and ensure the safety of their users’ data.

Извор линк

Најновији чланци

Gogs Vulnerabilities Allow Attackers to Hack Instances and Steal Source Code

The cybersecurity researchers at SonarSource recently uncovered several vulnerabilities in the popular open-source code...

FedRAMP Introduces Fresh Framework for Emerging Technologies

The U.S. federal government has recently introduced a new framework designed to prioritize emerging...

Networking Without Feeling Drained

In the cybersecurity industry, professional networking events and conferences are often saturated with alcohol,...

CSAM Pedophiles Identified Using Dark Web Malware by Tech Times

An innovative law enforcement technique has been uncovered, revealing how information-stealing malware logs on...

Више овако

Gogs Vulnerabilities Allow Attackers to Hack Instances and Steal Source Code

The cybersecurity researchers at SonarSource recently uncovered several vulnerabilities in the popular open-source code...

FedRAMP Introduces Fresh Framework for Emerging Technologies

The U.S. federal government has recently introduced a new framework designed to prioritize emerging...

Networking Without Feeling Drained

In the cybersecurity industry, professional networking events and conferences are often saturated with alcohol,...
sr_RSSerbian