

The broken print function also came to light for many after the v1.49 update. However, that is not enough to ensure immunity to various bugs and issues.įor instance, we previously highlighted an issue where users were unable to import HAR files after v114 update.

It prioritizes ease of use and simplicity, acting as a dependable and effective gateway to the online world. It is a crucial step millions of users forget and which leaves them open to attack.Google Chrome is one of the most powerful and widely used web browser and it has surely revolutionized the way we access and engage with the internet. Once your browser has updated, remember to restart it because the browser is not protected until this happens. If the update is not yet available for your browser, it is important that you check regularly for the new version. To check if you are protected, navigate to Settings > Help > About Google Chrome. Google warns that this “will roll out over the coming days/weeks” which means you may not be able to protect yourself immediately. In response to these threats, Google has released a new version of Chrome. The good news? While Chrome has now suffered its 16th zero-day vulnerability, the last was back in October, which shows some impressive progress by Google and its security partners in recent months.

With an overflow, critical data structures can be overwritten which makes it an ideal target for hackers. Also known as ‘Heap Smashing’, memory on the heap is dynamically allocated and typically contains program data. Heap buffer overflow flaws also remain a popular route of attack. UAF vulnerabilities are memory exploits created when a program fails to clear the pointer to the memory after it is freed. ‘Use-After-Free’ ( UAF) exploits have recently comprised the majority of Chrome attacks, with almost 40 vulnerabilities using this method since September.
