While the number of Internet-connected devices keeps growing, so does the army of bad actors who are trying to steal the private data of individuals and companies to break into their accounts and steal funds. Browsers are the most common target for hackers as they are considered the easiest to break in.
Google’s Chromium rendering engine is the most popular amongst web browsers. It powers Google Chrome, Microsoft Edge, Vivaldi, Brave, Comodo Dragon, Opera, and many more. This makes all these browsers highly exposed to attacks as most hackers create the so-called “in-the-wild” exploits specifically for Chromium.
“In-the-wild” exploits include a list of software environment vulnerabilities that are used by hackers to gain access to other users’ devices. These exploits are particularly popular amongst bad actors who use them to steal your personal data to blackmail you or withdraw money from your bank accounts without attracting any attention. Of course, Google is working hard to mend all the vulnerabilities as they appear, but it’s close to impossible to get rid of them forever.
The rapid growth of Chromium's popularity has made it a #1 target with the largest number of exploits at the moment. But how does Google deal with them? Here’s the list of efforts:
More frequent update cycle (reduced from 35 to 18 days);
Isolated tab processes;
Considerations of switching to a Rust-like secure coding language;
Additional individual background checks.
Easy Wins Are Over
The more complex Google Chrome becomes, the more exploits appear on the web. This means that every upgrade against a certain exploit gives birth to a bunch of new ones. Due to this, the improvement process becomes more and more complicated and performance-damping. Hopefully, developers find a better way of protecting our browsers. Have you ever experienced any privacy issues with Chrome lately? Tell your story in the comments and share the article with friends.