Skip to main content

Google rolls out security improvements to help flag up malicious websites

google project zero malwarebytes vulnerability headquarters
turtix/Shutterstock
Keen to ensure Web users experience as little hassle as possible during their online shenanigans, Google has introduced more security measures geared toward reducing the chances of getting done over by malware, phishing scams, and other cyber-related threats.

Following efforts last summer to boost protection against dodgy downloads, the Mountain View company this week further beefed up security for Chrome, Search, and ads.

For example, in addition to the current warning that shows up right before you go to download suspicious software, users of Google’s Chrome browser will now see an even more prominent warning (below) before they visit the site containing the link to the download.

google chrome warning
Image used with permission by copyright holder

It’s about as clear an alert as you can get – a prominent red cross in a large red box containing the text, “The site ahead contains harmful programs.” It adds that visiting the page may “harm your browsing experience” (and likely ruin your day) and also includes the option to allow Chrome to automatically report possible security incidents to Google in future.

Google Search’s security has been boosted, too, enabling it to better filter out sites it deems suspicious, while Google ads are now being disabled in instances where they lead to websites containing unwanted downloads.

The latest changes are part of  the Web company’s ongoing ‘Safe Browsing‘ initiative that seeks to spot unsafe websites and alert users and webmasters so they can take action to avoid trouble.

[Source: Google]

Editors' Recommendations

Trevor Mogg
Contributing Editor
Not so many moons ago, Trevor moved from one tea-loving island nation that drives on the left (Britain) to another (Japan)…
This Chrome extension lets hackers remotely seize your PC
A depiction of a hacker breaking into a system via the use of code.

Malicious extensions on Google Chrome are being used by hackers remotely in an effort to steal sensitive information.

As reported by Bleeping Computer, a new Chrome browser botnet titled 'Cloud9' is also capable of logging keystrokes, as well as distributing ads and malicious code.

Read more
Hackers are infiltrating news websites to spread malware
A black fedora rests on top of newspapers infected with spreading green lines..

Some alarming news broke today that hundreds of U.S. news websites are unwittingly playing a big role in a new malware campaign that's disguised as a Chrome browser update. This is quite a devious attack method since it's considered an important security practice to update your browser as soon as possible.

The way hackers are delivering the malware is also clever. It’s coming via an advertising network that also supplies video content to newspaper websites across the nation. It’s difficult to identify and shut down this attack because it is applied intermittently. According to a tweet by the security research team Threat Insight, the JavaScript code is being changed back and forth from the normal harmless ad delivery script to the one that includes the hacker code that shows a false update alert.

Read more
Apple Security Research website launches to protect your Mac
Apple Seurity Research website has resources for bug bounty hunters.

Apple just launched a new website that's dedicated to macOS and iOS security and there are already two blog posts that provide examples of what to expect, one providing a deep dive into memory allocation within the XNU kernel at the heart of all Apple devices, and another discussing the improved security bounty process.

The new website will undoubtedly become a critical resource for Apple security researchers, both providing information and serving as a hub for submitting bounties. The Apple Security Research website is also where you can apply for an official Apple Security Research Device (SRD) to help with identifying vulnerabilities by providing special access to what are normally protected areas of iOS.

Read more