Google's Chrome will automatically block malware

A version of Chrome designed for early testing will display a warning note letting users know when it prevents malware from being downloaded

A developer version of Google's Chrome browser will automatically flag and block malware that the user's anti-malware system wouldn't otherwise detect, Google said.

The "Canary" version of Chrome, designed for early testing by developers and others, will show a small warning note in the area of the screen reserved for downloads, notifying the user that it had prevented malware from being downloaded, Google said in a blog post. The new technology is in addition to Google's existing "Safe Browsing" capability, which blocks up to 10,000 new websites per day, based on a reputation score that Google develops and assigns.

The downloads Google will block with the new technology aren't flagged by an antivirus program as "traditional" malware, and people may not even know they're there, representatives said.  They may change browser settings or install ads, hijacking the browser for its own purposes.

Malware is constantly evolving and improving, as are the anti-malware systems deployed by browsers and dedicated software. As such, it's difficult to provide a comprehensive, up-to-date perspective on which solution protects you best. In May, NSS Labs ran a test comparing the effectiveness of the five leading browsers against a pool of 754 pieces of real-world malware. But that test, while indicative of the relative strength of each browser, is already out of date: NSS tested Microsoft's Internet Explorer 10, for example, instead of the latest IE11 installed in Windows 8.1. And NSS also tested Chrome 25/26, while Chrome is now up to version 30.

For what it's worth, however, NSS found that IE blocked 99.96 percent of the malware the firm threw at it, while Chrome blocked 83.16 percent. Those were the two best browsers, by far: Safari blocked 10.15 percent, Firefox 9.9 percent, and Opera just under 2 percent of malware.

NSS criticized the reputation schemes used by both IE and Chrome. "CAMP technology is by definition content agnostic and therefore more susceptible to false positives and user error. In order to offset the higher false positive rate of CAMP technologies the user is given a choice to block or allow content that is flagged as potentially untrustworthy, based upon reputational schemes. Good software that is not well known will be blocked. Malicious software that has been engineered to have excellent reputational aspects may evade protection. Depending on an untrained user to make the correct choice is unwise."

Google also added a "reset browser" setting, so that if your browser does become infected, it can be refreshed to what might be called the "factory state". Nevertheless, an up-to-date browser is just the first part of a secured PC.

Join the CSO newsletter!

Error: Please check your email address.

Tags NSS LabsapplicationsGooglesecuritybrowserssoftwaremalwarechromeantivirus

More about GoogleMicrosoft

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Mark Hachman

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts