Google Chrome users in India have received a significant security warning from the government. The latest Chrome security warning comes via The Indian Computer Emergency Response Team (CERT-In), which issued a security alert with a high severity ranking regarding the popular web browser Google Chrome, which will impact millions of Chrome users nationwide. The CERT-In bulletin has stated in its latest post that several vulnerabilities have been found in Google Chrome for desktops, which a remote attacker might abuse to carry out arbitrary code on the targeted system.

COMMERCIAL BREAK
SCROLL TO CONTINUE READING

The security alert mentions that the issue is linked to the uninitialized use and insufficient data validation in dawn. The officials from the CERT-In say that attackers can take advantage of these Chrome issues and prompt users to click on URL links that have malicious software, which can evade their device security and steal sensitive data. 

As per the latest security warning, users who use Chrome on desktops or PCs have to be very careful while clicking on such emails and downloading products from malicious URL links. Chrome is accessible on Mac, Windows, and Linux platforms as well. The officials suggest that users should install the latest accessible software upgrade for Chrome only on the platform they are using to stay safe by clicking on the three-dot menu on Chrome-Settings, - About- Update Chrome.

It is considered one of the major and dangerous security risks, which is bringing Apple and Google close so that they can combat the spy outbreak that has caused chaos for more than 15 years. Billions of people use Chrome and Safari browsers worldwide and the security hazard straight away impacts them as cybercriminals can easily evade their security network and obtain unauthorized access to their sensitive information and cause huge damage. 

Cyber security specialists have termed this issue as the 0.0.0.0 flaw, which is associated with users’ IP addresses. Cybercriminals utilize IP addresses to deceive the network into communicating with each other and let them have access to any private network of a targeted identity, hence it keeps users’ data and devices at significant risk.