Published: Fri, March 08, 2019
Electronics | By Shannon Stone

Chrome security lead urges you to patch it to avoid new exploit

Chrome security lead urges you to patch it to avoid new exploit

From there, you will be able to see your version number.

Although the auto-update feature in Chrome installs the new code, it does not mean that the effects are also enforced.

Justin Schuh, who leads the Google Chrome security and desktop engineering team, also recommends users to install the update immediately.

Schuh made the suggestion on Twitter, in which he pointed to a recent update to Chrome's Stable Channel for desktop systems.

Another day, another major security hole is found in a widely used piece of software. For example, all Apple Mac users are now exposed to a zero-day vulnerability first detailed March 4 that has yet to be patched.

"Access to bug details and links may be kept restricted until a majority of users are updated with a fix".

The flaw was uncovered by Clement Lecigne, a security engineer in Google's Threat Analysis Group.

"Google is aware of reports that an exploit for CVE-2019-5786 exists in the wild", the web giant said.

Google security officials are advising Windows users to ensure they're using the latest version 10 of the Microsoft operating system to protect themselves against a "serious", unpatched vulnerability that attackers have been actively exploiting in the wild.

While details are limited, it appears to be an issue with memory management as it relates to a part of Chrome called FileReader, which allows developers to issues pop-up menus. If you'd like to trigger a manual update, you can click the three dots in the upper-right corner of the window, select "Help" and "About Chrome". Or you might already be patched. It's not safe to venture out there alone (or at least without the latest browser updates).

Like this: