HomeRisk ManagementsGoogle to permit isolated web applications on Chrome access to sensitive USB...

Google to permit isolated web applications on Chrome access to sensitive USB devices

Published on

spot_img

Google has introduced a new feature that enhances the security of isolated web applications (IWAs). IWAs are applications that are not hosted on live web servers but are packaged into bundles signed by developers and distributed to users through various methods such as platform-specific installation formats like APK, MSI, or DMG.

The move by Google to improve security for IWAs comes as these applications are known for limiting interaction and data sharing between different applications and systems. By operating as isolated entities, IWAs offer benefits such as compromise containment, controlled access and permission, reduced dependency risks, and protection from cross-site scripting attacks.

One notable update from Google is the inclusion of a feature that allows IWAs with permission to use the “USB unrestricted” feature. This enhancement enables IWAs to access USB devices that are typically restricted under the “vulnerable devices” blocklist. With this feature, users can customize the types of USB devices that IWAs can access even when the “USB unrestricted” setting is turned on.

This development is significant as it adds an extra layer of security to IWAs by giving users more control over which USB devices can be accessed by these applications. By allowing customization of device permissions, users can better protect sensitive data and prevent unauthorized access to their devices.

The move by Google to enhance the security of IWAs reflects a growing awareness of the importance of securing web applications in today’s digital landscape. With cyber threats on the rise, it is crucial for developers and users alike to prioritize security measures to safeguard their data and privacy.

In conclusion, Google’s introduction of new security features for isolated web applications underscores the company’s commitment to enhancing cybersecurity for users. By providing tools that empower users to control access to USB devices, Google is taking proactive steps to mitigate potential security risks associated with IWAs. As technology continues to evolve, it is essential for companies to stay ahead of emerging threats and ensure the safety of their users’ data.

Source link

Latest articles

Webinar: Inside FortiSASE Sovereign – Architecting Private, Compliant SASE at Scale

Webinar: Inside FortiSASE Sovereign - Architecting Private, Compliant SASE at Scale In a significant development...

LatAm Experiences Twice as Many Cyberattacks as the US

Cybersecurity Challenges in Central and South America: A Growing Concern In recent years, Central and...

Next Gen Spotlights: Preparing for a Post-Quantum World – Q&A with Cavero Quantum

As the field of quantum computing gradually transitions from theoretical research to practical implementation,...

ContextCrush Flaw Exposes AI Development Tools to Vulnerabilities

Context7 MCP Server Vulnerability Disclosed: Understanding ContextCrush A critical vulnerability has come to light affecting...

More like this

Webinar: Inside FortiSASE Sovereign – Architecting Private, Compliant SASE at Scale

Webinar: Inside FortiSASE Sovereign - Architecting Private, Compliant SASE at Scale In a significant development...

LatAm Experiences Twice as Many Cyberattacks as the US

Cybersecurity Challenges in Central and South America: A Growing Concern In recent years, Central and...

Next Gen Spotlights: Preparing for a Post-Quantum World – Q&A with Cavero Quantum

As the field of quantum computing gradually transitions from theoretical research to practical implementation,...