HomeRisk ManagementsGoogle to permit isolated web applications on Chrome access to sensitive USB...

Google to permit isolated web applications on Chrome access to sensitive USB devices

Published on

spot_img

Google has introduced a new feature that enhances the security of isolated web applications (IWAs). IWAs are applications that are not hosted on live web servers but are packaged into bundles signed by developers and distributed to users through various methods such as platform-specific installation formats like APK, MSI, or DMG.

The move by Google to improve security for IWAs comes as these applications are known for limiting interaction and data sharing between different applications and systems. By operating as isolated entities, IWAs offer benefits such as compromise containment, controlled access and permission, reduced dependency risks, and protection from cross-site scripting attacks.

One notable update from Google is the inclusion of a feature that allows IWAs with permission to use the “USB unrestricted” feature. This enhancement enables IWAs to access USB devices that are typically restricted under the “vulnerable devices” blocklist. With this feature, users can customize the types of USB devices that IWAs can access even when the “USB unrestricted” setting is turned on.

This development is significant as it adds an extra layer of security to IWAs by giving users more control over which USB devices can be accessed by these applications. By allowing customization of device permissions, users can better protect sensitive data and prevent unauthorized access to their devices.

The move by Google to enhance the security of IWAs reflects a growing awareness of the importance of securing web applications in today’s digital landscape. With cyber threats on the rise, it is crucial for developers and users alike to prioritize security measures to safeguard their data and privacy.

In conclusion, Google’s introduction of new security features for isolated web applications underscores the company’s commitment to enhancing cybersecurity for users. By providing tools that empower users to control access to USB devices, Google is taking proactive steps to mitigate potential security risks associated with IWAs. As technology continues to evolve, it is essential for companies to stay ahead of emerging threats and ensure the safety of their users’ data.

Source link

Latest articles

Researcher Claims Claude Opus Enabled Development of Functional Chrome Exploit

AI-Driven Exploit Development: Concerns Arise as Claude Opus Demonstrates Rapid Offensive Security A recent experiment...

Google Blocks 602 Million Scam Ads

Google Achieves Milestone in Blocking Scam Ads with Gemini AI Google has recently made a...

First CEO Advocates for CVE Collaboration

The cybersecurity industry is currently confronting a profound challenge as the number of software...

Nexcorium Mirai Variant Exploits TBK DVR Vulnerability in New IoT Botnet Campaign

Nexcorium Malware Variant Emerges, Targeting Unpatched IoT Devices A newly identified variant of Mirai malware,...

More like this

Researcher Claims Claude Opus Enabled Development of Functional Chrome Exploit

AI-Driven Exploit Development: Concerns Arise as Claude Opus Demonstrates Rapid Offensive Security A recent experiment...

Google Blocks 602 Million Scam Ads

Google Achieves Milestone in Blocking Scam Ads with Gemini AI Google has recently made a...

First CEO Advocates for CVE Collaboration

The cybersecurity industry is currently confronting a profound challenge as the number of software...