Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Google Chrome adds application-specific encryption to protect cookies from malware
Global Security

Google Chrome adds application-specific encryption to protect cookies from malware

AdminBy AdminAugust 1, 2024No Comments3 Mins Read
encrypted cookies
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 1, 2024Ravi LakshmananData Encryption / Browser Security

encrypted cookies

Google has announced that it is adding a new layer of protection to its Chrome browser through so-called application-bound encryption to prevent information-stealing malware from hijacking cookies on Windows systems.

“On Windows Chrome uses the Data Protection API (DPAPI) that protects data at rest from other system users or cold boot attacks.” — Will Harris of the Chrome Security Team said. “However, DPAPI does not protect against malware capable of executing code on behalf of a logged-in user, which is used by information thieves.”

Application-bound encryption is an improvement over DPAPI in that it weaves the identification data of the application (such as Chrome in this case) into the encrypted data to prevent another application on the system from accessing it when attempting to decrypt it.

Cyber ​​security

“Because the service attached to the application runs with system privileges, attackers need to do more than just get the user to run the malicious application,” Harris said. “Malware now has to gain system privileges or inject code into Chrome, something legitimate software doesn’t have to do.”

Since this method tightly binds the encryption key to the machine, it will not work correctly in environments where Chrome profiles are moved between multiple machines. Organizations that support roaming profiles are encouraged to follow it Best practices and adjust ApplicationBoundEncryptionEnabled politicians.

A change that has come into effect last week with release Chrome 127 only applies to cookies, although Google has said it intends to extend this protection to passwords, payment data and other persistent authentication tokens.

Back in April, the technology giant outlined method that uses a Windows event log type called DPAPIDefInformationEvent to reliably detect access to browser cookies and credentials from another application on the system.

It should be noted that the web browser protects passwords and cookies on Apple macOS and Linux systems with Keychain services and system-provided wallets such as kwallet or gnome-libsecret respectively.

The development comes amid a number of security improvements added to Chrome in recent months, including advanced safe browsingBinding Session Credentials (DBSK), and automated scans when downloading potentially suspicious and malicious files.

“Encryption tied to the program increases the cost of data theft for attackers, and also makes their actions on the system much more noisy,” Harris said. “It helps advocates draw a clear line in the sand about acceptable behavior for other programs in the system.”

It is also Google compliant announcement that it no longer plans to deprecate third-party cookies in Chrome, prompting the World Wide Web Consortium (W3C) to reiterate that they allow tracking and that the decision undermines the progress made so far to make the web work without third-party cookies.

“Tracking and subsequent data collection and mediation can support micro-targeting of political messages, which can have a detrimental impact on society,” it said. said. “The unfortunate downward spiral will also have secondary effects, as it is likely to delay cross-browser work on effective alternatives to third-party cookies.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.