Update your Google Chrome immediately! The government issues high-risk security warnings. (unsplash)News 

Government issues high-risk alert for updating Google Chrome browser on your computer immediately

The Indian Computer Emergency Response Team (CERT-In) has issued a warning about high-security risks associated with multiple vulnerabilities found in Google Chrome desktop versions for Windows, Mac, and Linux. This marks the second such warning in the past 10 days, prompting Google to release an urgent update. Users are advised to take immediate action to address these vulnerabilities and ensure their systems are secure during this critical period.

Google Chrome in great danger

According to the CERT-in warning, Google Chrome desktop version 123.0.6312.105/.106/.107 for Windows and Mac and Google Chrome version 123.0.6312.105 for Linux are affected. These vulnerabilities pose the risk of denial-of-service (DoS) conditions, data leaks, and more.

The reason for the vulnerabilities was said to be problems with the Framework, System, MediaTek components and other sources. The warning said: “These vulnerabilities are found in Google Chrome due to an improper implementation of V8, bookmarks after free access, and out-of-bounds memory in V8.” For now, the agency advises Google Chrome desktop users to install the appropriate updates when available.

How to update Google Chrome?

  • Open Google Chrome on your desktop.
  • Now look for the three dots click in the upper right corner.
  • Go to “Help” and tap “About Google Chrome”.
  • Chrome checks for the latest updates and installs new updates automatically.
  • When the update is complete, tap the restart button to restart the browser.

Following the steps mentioned above will help you eliminate any security risks reported by the government. Also, keep an eye on the latest updates to make sure you’re using the latest version of your browser. Small steps like this can save you from serious cyber attacks. Make sure you take corrective action in a timely manner and follow the instructions given by the cybersecurity authorities.

Related posts

Leave a Comment