


The beta version is a preview of what will be present in the stable version of chrome, so you can test and be prepared for any new behavior in Chrome. The Beta channel includes new features up to six weeks before they’re included in Stable.

You might also want to consider targeting a group of users with the beta version for user feedback. However, since Chrome’s update cycle is frequent, Google recommends application owners test with the Beta Channel of Chrome. It is a best practice to keep auto-updates turned on to ensure that your users get the latest updates and security fixes in Chrome. Because users spend a large portion of their day in the web browser, we wanted to arm IT admins like you with tips that can help prevent issues that could impact users, and advice on how to troubleshoot if unexpected issues with Chrome Browser happen to come up. And this is even truer now than ever with so many applications to manage. (Only the headline and picture of this report may have been reworked by the Business Standard staff the rest of the content is auto-generated from a syndicated feed.For IT teams, supporting users, especially remotely, can be difficult. The functionality allows users to upload and manage different versions of a file. The Hacker News reported that Google is aware of the latest security issue that is found in the "manage versions" functionality in Google Drive. Hackers could also exploit an unpatched flaw in Google Drive to distribute malicious files disguised as legitimate files on systems worldwide. With proper memory layout manipulation, an attacker can gain full control of this use-after-free vulnerability which could ultimately lead to arbitrary code execution in the context of the browser.Īnother bug was found in Google's Chromium-based browsers in early August that could allow hackers to bypass the Content Security Policy (CSP) on websites, in order to steal data and execute rogue code. "This vulnerability specifically exists in ANGLE, a compatibility layer between OpenGL and Direct3D that Chrome uses on Windows systems," Munshaw informed in a statement on Monday. The Google Chrome web browser had a use-after-free vulnerability in its "WebGL" component that could allow a user to execute arbitrary code in the context of the browser process.Ī hacker could manipulate the memory layout of the browser in a way that they could gain control of the use-after-free exploit, which could ultimately lead to arbitrary code execution.Īccording to Jon Munshaw from Cisco Talos, the security researchers worked with Google to ensure that these issues are resolved and that an update is available for affected customers. Google has fixed a high-severity flaw in the latest version of Chrome browser that could lead to code execution.
