The security flaw threatens more than 2 billion Google Chrome users
Just released three weeks ago, Chrome 81 version contained two dangerous security holes that allowed hackers to attack and control the entire computer system of the victim.
Page Forbes said, Google has just confirmed the two vulnerabilities rated as severely affecting the Chrome web browser, and release immediately an update just three weeks after launching Chrome 81 market in April 7.4. Because this security incident easily paves the way for an attacker to gain control of the system, the US Department of Infrastructure and Network Security (CISA) recommends that all users immediately update the latest patch. .
According to Prudhvikumar Bommana - Google Chrome's technical manager, the two security holes were first discovered by Zhe Jin, an expert at security company Qihoo 360 (China).
CVE-2020-6462, one of the two vulnerabilities identified as a use-after-free (allowing hackers to attack after users interact with malware) related to the task scheduling function of Chrome. This discovery brought a $ 10,000 bonus to Jin. Meanwhile, the second vulnerability, dubbed CVE-2020-6461, affects storage.
Another critical security flaw, discovered in the April 15 Chrome update, was also discovered by security researchers at Qihoo 360 and reported to Google.
The details of the issue have not been publicly released to ensure as many users have updated as possible before hackers could take advantage of official information.
There is currently no evidence that any successful exploits with these two vulnerabilities were found. The safest version of Chrome right now is 81.0.4044.129, users of Google's web browser, even if they are using computers using Windows, macOS or Linux, are encouraged to update to the latest software patch to avoid risks. ro.
4 ★ | 1 Vote
You should read it
- Instructions for backing up and storing data on your Android device securely
- Google Chrome again urgently updates to patch serious security holes
- Top 30 serious security holes are being exploited by hackers the most
- Internet Explorer has vulnerabilities, unused users are still hacked
- There are vulnerabilities that allow hackers to bypass the fingerprint security mechanism of Lenovo computers
- Instructions for backing up all data on Android device without root
- Millions of Android devices stick with security holes in firmware, hackers can exploit to lock users' machines
- Fortnite for Android has a security vulnerability
- Detect 2 serious security holes in the Zoom application
- Microsoft has a group of 'elite' hackers that specialize in attacking Windows to keep the operating system safe
- Restore settings and data on Android with Google Backup
- Manual backup and data recovery on Android devices
Maybe you are interested
iPhone security tips you're missing out on
This list of common passwords shows how little we understand about online security
Download free Windows Server 2025 security guide
5 Misconceptions About Password Security
Should I buy a USB, Bluetooth or NFC security key?
4 Security Steps to Follow When Using Remote Access Applications