1. Computing

Google Chrome Security

By

Google Chrome Security

What is Google Chrome?:

While Microsoft essentially is the PC by virtue of its dominance in the operating system and application arenas, Google is just as synonymous with in the Web realm. In fact, Google has evolved well beyond its origins as a Web search engine and has sought to rewrite the rules of engagement and take on Microsoft head-to-head in many areas.

Because Google is a web-based company that designs web-based applications, they decided to develop their own web browser from the ground up to work more efficiently, productively, and securely than with current browsers such as Internet Explorer and Firefox.

Crash Control:

One of the most innovative features of Google Chrome is the sandboxing functionality. Internet Explorer and other browsers run one instance of the browser engine with multiple associated processes. That means that if one or more browser windows or tabs crash or run into issues, it will most likely crash the web browser engine and take down every other instance with it.

Google Chrome runs each instance separately. Malware or issues in one tab can not affect other open browser instances, and the browser is unable to write to or modify the operating system in any way- protecting your PC from attack.

Incognito Surfing:

Maybe you are just private and don't think that details of your web surfing should be retained on your system. Perhaps you are trying to shop for a spouse online and you don't want the search or history data to reveal what you might be shopping for. Whatever your reason, Google Chrome has an Incognito feature which lets you surf the Web with relative anonymity.

The Incognito mode can also be useful when browsing on public systems like library or school PC's. With Incognito the sites you open and files you download are not logged in the browser history and all new cookies are removed when the session closes.

Safe Browsing:

Secure web browsing relies on certificates to verify the authenticity of the server you are connected to. Some attacks can be accomplished though by providing a certificate to convince your browser it is safe, but redirect you to a different, malicious web site.

Google Chrome compares the information provided in the certificate with the actual server being connected to and alerts you if the information doesn't jive. If Chrome detects that the address specified in the certificate and the actual server you connect to are not the same, it issues this warning "'This is probably not the site you are looking for!"

Vulnerabilities and Flaws:

Almost as soon as Google released the public Beta version of the software security researchers began to identify flaws and vulnerabilities. Any new software is typically run through the ringer, but a web browser from the company synonymous with the web gets some extra attention.

Chrome was quickly discovered to be vulnerable to a 'carpet-bombing' flaw originally identified in Apple's Safari browser. A few days later it was found to have a buffer overflow flaw that could also be exploited for malicious attacks.

The Verdict:

While there have been a couple security flaws and vulnerabilities identified, no web browser is perfect and in Google's defense Chrome is still in Beta testing.

Chrome does have a variety of innovative features and a unique interface that many users have quickly come to prfer over Internet Explorer and Firefox. Many users also report that it is faster at loading pages than other web browsers. The additional security controls should prove valuable in helping you surf the Web safely. Google Chrome is definitely worth taking a look at.

Download Google Chrome:

You can download the current version of the Google Chrome web browser here: Download Google Chrome
  1. About.com
  2. Computing
  3. Internet / Network Security
  4. Web Browser Security
  5. Google Chrome Security: A Brief Overview of Google Chrome Security Features and Issues

©2014 About.com. All rights reserved.