Internet users should do this now, otherwise your device may get hacked


Google recently rolled out an ’emergency’ software update for version 99 to fix a number of serious bugs or vulnerabilities in the Chrome browser. Soon after the release of this update, the Indian Computer Emergency Response Team (CERT-In), part of the Indian IT ministry, issued an “urgent” warning to Internet browser users to immediately update their systems to the latest version of Google Chrome. , 99.0. Recommended to update to version 4644.64 (99.0.4844.84).

Instructions to install CERT-in latest update of Google Chrome browser, warning issued to every internet user

CERT-in reported in a recent guide that “a vulnerability has been found in Google Chrome. And by taking advantage of this vulnerability, hackers will be able to remotely send malicious code to the target system.” However, the biggest concern is that hackers have already started taking advantage of this software vulnerability. As a result, Chrome Internet browser users are more likely to lose access to sensitive data. For this reason, CERT-In recommends that every Internet user update the software version immediately.

Added CERT-IN, explaining Google Chrome’s vulnerabilities: Remote attackers can exploit this vulnerability by sending specially developed webpages to the target system, triggering type confusion errors, and displaying arbitrary code. And to take full advantage of this vulnerability, remote attackers would be able to execute arbitrary code and take control of the target system. ,

Incidentally, Google recently launched a stable channel update of 99.0.464.64 Chrome version for Windows, Mac and Linux from March 25.

CERT-In has issued a similar warning for Mozilla Firefox users

In addition to the Google Chrome browser, CERT-In has issued a similar guideline for Mozilla Firefox users. According to the announcement, several security vulnerabilities have been found in Mozilla’s browser. Using this, hackers will be able to bypass security restrictions, manage spoofing attacks, perform arbitrary code, steal sensitive information, and repel service attacks on target systems.