Um, what happened to: https://www.askvg.com/tip-restore-https-and-www-in-website-urls-in-google-chrome-address-bar/
After nearly a day of usage, I am not too impressed by Tab Hover Card Images feature. I'm reverting back. Seems more gimmicky to me than useful. Hi, Osaban!
Hi Page! We haven't interacted for a long while, it is good to know you are still active, and I love your quotes in your signature... I agree these experimental features are basically decorative, they are not really that useful... By the way what is the difference between "Enabled, Enabled B, Enabled C" ?
Best I was able to comeup with is... I can say without a doubt that I am not the one who is going to test the small but noticeable difference. Btw, thanks for the + comment on the quotes.
It's an unnecessary resource hog which I also disabled on Windows taskbar icons ('peek') long ago and I hope that it never becomes default on Chrome.
Fast forward: What's coming in future versions of Chrome? by Gregg Keizer (Updated October 25, 2019)
Google Chrome Portable 78.0.3904.70 Stable (web browser) Released (October 28, 2019) (PortableApps.com)
hi just updated and i can't find anymore i was sure to run the 78 version but i had installed 77 can't find them anymore , now v 78.0.3904.70
Google strengthens Chrome's site isolation to protect browser against its own vulnerabilities by Gregg Keizer.
Summary: A method is detailed - dubbed CSS Exfil - which can be used to steal targeted data using Cascading Style Sheets (CSS) as an attack vector. Due to the modern web's heavy reliance on CSS, a wide variety of data is potentially at risk, including: usernames, passwords, and sensitive data such as date of birth, social security numbers, and credit card numbers. The technique can also be used to de-anonymize users on dark nets like Tor. PHP: https://www.mike-gualtieri.com/css-exfil-vulnerability-tester
The Stable channel has been updated to 78.0.3904.87 for Windows, Mac, and Linux. http://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html Code: x64 (55.0 MB) https://dl.google.com/release2/chrome/d6nP5guaML5SPMnesDdb9Q_78.0.3904.87/78.0.3904.87_chrome_installer.exe x86 (54.2 MB) https://dl.google.com/release2/chrome/ANI8JFoZr39FwklYIfhT3S8_78.0.3904.87/78.0.3904.87_chrome_installer.exe
On Halloween night, Google discloses Chrome zero-day exploited in the wild On Halloween, Google releases Chrome 78.0.3904.87 to patch a Chrome zero-day discovered by Kaspersky exploited in the wild November 1, 2019 https://www.zdnet.com/article/hallo...closes-chrome-zero-day-exploited-in-the-wild/ Kaspersky: Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium
Google Chrome is Getting the 'Close other tabs' Option Back https://www.bleepingcomputer.com/ne...-is-getting-the-close-other-tabs-option-back/
Google Chrome Portable 78.0.3904.87 Stable (web browser) Released (November 2, 2019) (PortableApps.com)
What I would like to know is how they managed to install malware via this zero day, because it doesn't seem to be a sandbox bypass. But Sandboxie would have at least contained the malware.
Google Chrome will block mixed content in the near future November 6, 2019 https://www.ghacks.net/2019/11/06/google-chrome-will-block-mixed-content-in-the-near-future/