Patch, Patch, Patch! Google Chrome Zero Day Vulnerability Uncovered!

by

June 11, 2021

Are you a Chrome user? If so you better update your software. Google has just announced a new software update that’s designed to take care of a critical flaw in the software’s Javascript engine (among other things).

The vulnerability, labeled as CVE-2021-30551, deals with something referred to as “type confusion in V8.” V8 is a Chrome element that runs JavaScript. Type confusion is when you input V8 a specific sort of data but trick JavaScrip into processing it as if it were something else. This could potentially bypass security on the end-point (i.e. running unauthorized code like a drive-by download).

JavaScript exploits are fairly popular and can cause a substantial amount of damage. For example, a drive-by download (as mentioned above) is when a user visits a compromised website and bad guys run rogue code in the background, most likely to install malware.

How to Upgrade

Thank goodness, this is an easy problem to avoid. Here’s how:

  1. Check which version of Chrome you’re operating. Click the three vertically aligned dots in the upper left-hand corner of the Chrome window.
  2. Select Help>About Google Chrome. This is where the version you’re using will be displayed. If it’s 91.0.447.101 you’re good to go.
  3. If it’s NOT 91.0.447.101 you’ll be prompted to update and restart your browser. Just follow the prompts.

Like our blog? Subscribe using the CTA in the upper right-hand corner of this page. Feel like sharing your thoughts with us? Use the comment section below.

Carl Keyser is a Digital Marketing Specialist at Integris.

Keep reading

How the Best IT Companies in Minnesota Support the Hybrid Workforce

How the Best IT Companies in Minnesota Support the Hybrid Workforce

After the initial shutdowns and stay-at-home orders lifted following COVID-19, workers throughout the United States and Minnesota decided that the work-from-home model was here to stay. It makes sense -- working from home offers a lot of convenience to your team – and...

Do I Need To Improve My Endpoint Protection?

Do I Need To Improve My Endpoint Protection?

A compromised endpoint gives hackers everything they need to get a foothold in your security network. Once there, they can steal data and potentially hold it for ransom. That’s why it’s so important for business owners to secure their critical endpoints (including...

Multi-Factor Authentication

Multi-Factor Authentication

Granting access to information is a necessity, as is security for both the user needing access and for the information for which access is being granted. The best way to handle this is by establishing user accounts for users. This does several things at once: Allows...