Vulnerabilities found in Google Chrome PC security

SHARE:



BOSTON: Google Inc brags that computers running its recently released Chrome operating system are a lot safer than traditional PCs, partly because user data is stored in the Internet cloud and not on the machine. 
Yet researchers at an independent computer security firm warn that the Chrome PC's reliance on Web computing makes it vulnerable to the same attacks that hackers have been launching on websites and Web browsers for years. 

Matt Johansen , a researcher with WhiteHat Security, said he identified a flaw in a Chrome OS note-taking application that he exploited to take control of a Google email account. He reported it to Google, which fixed the problem and gave him a $1,000 reward for pointing it out. Johansen said he has since discovered other applications with the same security flaw. 


"This is just the tip of the iceberg," he told Reuters. "This is just evolving around us. We can see this becoming a whole new field of malware." 
Google is betting that the launch of its Web-centric Chrome OS PCs will help reshape the the decades-old personal computer industry, challenging entrenched players such as Microsoft Corp and Apple Corp The first Chrome PC laptop, from Samsung, went on sale earlier this month. Early reviews have been mixed, with some influential technology hands noting that the concept of an always-Internet-connected PC may be ahead of its time and not ideal for mainstream users. 

One key to hacking Chrome OS is to capture data as it travels between the Chrome browser and the cloud, Johansen said. Hackers have until now mostly targeted data that sits on a machine's hard drive. 
"I can get at your online banking or your FaceBook profile or your email as it is being loaded in the browser," he said. "If I can exploit some kind of Web application to access that data, then I couldn't care less what is on the hard drive." 

Johansen declined to identify the applications with the security bugs. He and colleague Kyle Osborn are holding back that information for a presentation at Black Hat, a prestigious hacking conference to be held this August in Las Vegas. 

Those applications belong to a class of software programs known as "extensions," which users download from the Google Chrome Web Store . Extensions are essentially applications that run inside browsers 
The bulk of Chrome OS extensions are written by independent software developers, not by Google. 
Johansen said the problem with the extensions is related to a design flaw in Google Chrome OS: the operating system gives extensions sweeping rights to access data stored on the cloud. 

"Chrome is trusting these extensions more than it would be trusting just another website," he said. 
Executives at Google said they are looking to improve procedures that screen extensions for vulnerabilities before clearing them for the Chrome Web Store. 

Caesar Sengupta, director of Chrome OS, said the company was exploring "various ways" of trying to automatically tag questionable extensions. Yet he said that Google did not want to make it onerous for developers to get their extensions distributed through the marketplace. 

"We are trying to create a system that -- like the Web -- is open," he said. 
Alex Stamos, a security expert with iSec Partners who helped develop the security system for Chrome OS, said that it would be unfair to condemn the overall security of the new operating system just because of the issues cited by the WhiteHat researchers. 

"While things might not be perfect, we are talking about a much more controlled and secure environment than you have on Windows and Mac PCs ," he said.

COMMENTS

Name

4G,1,A/B Testing,2,Aerospace Engineering,2,AFP Consortium,1,Agile,2,AI,5,amazon,4,Amazon india coupons,3,AMD,1,Analytics,2,android,28,android phones,2,Anonymous,3,Antivirus,1,app,24,App Development,6,apple,32,apps,5,Artificial Intelligence,8,Assurance,1,asus,1,Audi,2,auto,7,automation,2,automation software,11,automotive technology,11,banking,1,Big data,2,bitcoin,3,BlackBerry,5,blockchain,4,blogging,1,BMW,1,branding,1,brands,2,browser,2,Business,18,Business Analytics,2,Business Intelligence,1,Business lesson,18,Business models,6,business strategy,24,Business Strategy Model,16,Business Success Story,7,business techniques,24,cameraphone,5,car,15,car technology,11,CES,1,chromebook,3,Cloud computing,6,cloud Technology,5,CMS,1,coding,1,companies,3,Consortium,1,consulting,1,content marketing,9,corporate,1,coupons,3,CRM,2,CRM Software,3,cryptocurrency,2,Customer experience,8,Customer Service,7,customer support,4,cyber crime,5,cyber security,27,data,3,data recovery,1,deals,1,Dell Streak,1,development,9,devices,2,DevOps,1,digital currency,1,digital marketing,23,Digital Transformation,2,disk,1,e commerce,1,eBay,1,ebook,1,ecommerce,8,Electric Cars,11,electronics sale,2,elon musk,2,email,1,energy,1,enterprise,11,Enterprise Security,2,enterprise technology,9,entrepreneur,3,entrepreneurship,7,ERP,2,facebook,24,file conversion,1,financial tech,1,fintech,1,firefox,2,firefox os,2,Flipkart,2,Front-end Development,3,future business,10,future technology,34,gadget,33,gamail,1,games,6,Games.,1,google,20,google cars,1,google glass,3,Google I/O,1,Google+,8,goole ranking,1,Graphics Card,1,Green energy,1,hackers,18,hacking,14,hardware,5,Healthcare,1,HealthTech,1,Home Automation,1,Hosting,3,How To Guides,22,How Tos,17,icloud,3,IDE,1,Infographic,2,Information Technology,19,infosec,14,innovation,52,internet,8,Internet Explorer,1,Internet of Things,8,Inventory Management,1,ios,18,IoT,10,ipad,8,iPhone,14,iPhone 8,1,IT certification,1,IT Operation,1,IT Service,2,IT services management,3,ITSM,2,iWatch,1,Jabong,1,JavaScript,4,JS,1,Kubernetes,1,laptop,3,LinkedIn,2,local business,1,Lotus Notes,3,MacBook,3,mackbook air,2,Magento,1,Managed IT Services,3,Mark Zuckerberg,4,Mercedes,1,messenger,1,microsoft,6,mobile app development,28,mobile apps,30,mobile broadband,1,mobile enterprise,15,mobile recharge,2,mobility,18,mobility management,11,Motorola Xoom,1,Myntra,1,network,4,nokia,1,NSA,2,Nvidia,1,Objective-C,1,Omnichannel,1,OnePlus Smartphones,1,online course,1,online education,2,online recharge,1,online shopping,4,open source,1,opreating system,5,Outlook,2,P2P,1,page ranking,1,patent,1,Payment,1,PayTM,1,pc software,1,photoshop,1,playstation,1,Porsche,1,process management,4,Procure,1,programming,4,programming language,5,Python,1,Quality,2,Redbus,1,remote control,1,renewable energy,3,review,10,SAAS,4,sales,2,Sales Funnel,2,samsung,7,scrum,1,search engine,4,Search Engine Optimization,2,security,15,Self Driving Cars,11,SEO,9,smartphone,14,SmartTech,1,SME,1,sms,1,Snapdeal,2,social media,12,social network,11,software,14,Software as a service (SaaS),5,software development,17,software methodology,8,Software Outsourcing,2,software review,4,Solar,1,Solar energy,1,Solar power,1,startup,10,steve jobs,3,storage,1,strategy,1,Supercars,1,sustainability,1,Swift,1,tablet,9,team management,3,tech,4,tech conference,1,Tech event,2,Ted talk,1,Tesla,2,Tesla Motors,3,The Internet Of Things,2,timeline,1,toolbar,1,tools,2,torrent,1,touchscreen,2,trdx,1,tutorial,2,twitter,3,udacity,1,udemy,1,ultrabook,1,USB,1,video,2,video editor,2,virtual phone,1,Virtual Reality,4,Volvo,2,VPN,3,VR,2,Wearable gadget,2,Wearable Tech,2,Web 4.0,3,Web Development,9,web technology,12,Wi-Fi,1,wikileaks,2,windows,7,windows 10,1,Windows 8,8,Windows 8 Preview,1,Wordpress,3,workplace,2,X Mountain Lion,2,xcode,1,xp,1,
ltr
item
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos: Vulnerabilities found in Google Chrome PC security
Vulnerabilities found in Google Chrome PC security
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1rq8I_YEsctOsW4HuzWT3pOMoRsKK_sXuh8V7ariJLh2mKqRd8Zn59BtdosddT8B9buv0kAD0I_mcam-HttR0rDvwFlhGNRif0J1HtPHb2_j32h8zEkoRHxRj1iK09R8ReEfbPLHqkwo/s320/google-chrome-logo.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1rq8I_YEsctOsW4HuzWT3pOMoRsKK_sXuh8V7ariJLh2mKqRd8Zn59BtdosddT8B9buv0kAD0I_mcam-HttR0rDvwFlhGNRif0J1HtPHb2_j32h8zEkoRHxRj1iK09R8ReEfbPLHqkwo/s72-c/google-chrome-logo.jpg
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos
https://www.techfond.in/2011/06/vulnerabilities-found-in-google-chrome.html
https://www.techfond.in/
https://www.techfond.in/
https://www.techfond.in/2011/06/vulnerabilities-found-in-google-chrome.html
true
6925568668654321940
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy