Not too long ago, Google reported High risk vulnerabilities identified by Information Security Professionals. blackbox testing techniques released addresses 11 vulnerabilities from which, one is critical, while 5 others are regarded rather high. Often serious software organizations depend on penetration testing to uncover vulnerabilities in code or the systems they are hosted on. In this situation, Google locked down its bug monitoring website to conceal the details on the vulnerabilities, but licensed information security professionals were able to uncover the vulnerabilities.
Google paid a thousand dollars bounty to the information security professionals for the findings of theirs. A situation with the autofill feature of Chrome, that facilitates automated entry of names, credit card numbers and contact numbers on a site form, is labeled as the root cause of the vulnerability. Problems with the browser on the submission of a form on a site was experienced by users. The autofill feature was leading to browser collapse on type submission.
The critical vulnerability is revealed at a point in time, when Chrome is steadily gaining user base. Firefox, Opera and internet Explorer are other main Internet browsers popular among users. Of the remaining 6 vulnerabilities, three are rated as risk that is high and 2 as low risk vulnerabilities. Google strives to hasten the advancement of Chrome by releasing brand new versions at regular intervals. Chrome is compatible with Windows, Linux operating systems and Mac. Attackers are usually on the lookout to find vulnerabilities and breach browsers, networks and solutions. There is usually a moment lag between the release of a patch along with its update by users. Criminals take advantage of this particular time gap and slow response to security updates by drivers. Users are able to keep tabs on the security updates as well as releases from software designers to determine and apply related security patches for their safety measures products. Adhering to safety measures advisories, routinely installing anti-virus and anti-spyware solutions can help organizations and men and women to defend their systems and networks.