NEWS

Google Chrome, Apple Safari, and Microsoft Edge users could be hacked, warns IT Ministry’s CERT-In

The Indian Computer Emergency Response Team (CERT-In) of the IT Ministry has issued a warning about several vulnerabilities in Google Chrome and Apple Safari browsers. Users of Google Chrome versions previous to 99.0.4844.74 have been warned of potential hacking.

While one can assume that the majority of the Chrome and Safari users have upgraded to their latest versions, the threat of being hacked to those who haven’t upgraded their browsers is quite serious.

Update Google Chrome, Safari, and Edge browsers to prevent getting hacked

CERT-In issued warnings to users stating the vulnerabilities that the browsers are exposed to:

“Multiple vulnerabilities have been reported in Google Chrome, which could allow a remote attacker to execute arbitrary code, bypass security restrictions or cause a denial of service condition on the targeted system.”

– CERT-In

While issuing the warning, the CER team of the IT Ministry also elaborated in informing about how the security threats exist in Google Chrome. They said it was due to “Use after free in Blink Layout, Extensions, Safe Browsing, Splitscreen, ANGLE, New Tab Page, Browser UI and Heap buffer overflow in GPU“.

More stories from us that you may like:

However, the Apple Safari browser and Microsoft Edge are also not safe. The CERT-In also issued warnings for Apple Safari versions prior to Safari 15.4 for macOS.

“Multiple vulnerabilities have been reported in Apple Safari and WebKit for macOS Big Sur and macOS Catalina which could be exploited by an attacker to cause address bar spoofing, arbitrary code execution and unexpected cross-origin behaviour on the targeted system.”

Users must apply the necessary patches as per Apple Security Updates for the same. As of Microsoft Edge users. Recently, the CERT-In also stated that various vulnerabilities in the Microsoft Edge browser had been discovered, which might allow a remote attacker to compromise the targeted system. By sending a carefully designed request, an attacker can exploit loopholes.

“If you like this article follow us on Google NewsFacebookTelegram, and Twitter. We will keep bringing you such articles.”

Shazia Irani

Passionate about technology, the geek world and a little nerdy. My title says I'm a accountant, but in reality I just love writing about what I love. Technolover.

Related Articles

Back to top button