{"id":1435,"date":"2013-03-19T12:32:30","date_gmt":"2013-03-19T16:32:30","guid":{"rendered":"http:\/\/blog.nccomputertech.com\/?p=1435"},"modified":"2013-03-19T12:32:30","modified_gmt":"2013-03-19T16:32:30","slug":"google-chrome-best-security-tips-for-safer-browsing","status":"publish","type":"post","link":"https:\/\/nccomputertech.com\/techtalk\/2013\/03\/19\/google-chrome-best-security-tips-for-safer-browsing\/","title":{"rendered":"Google Chrome: Best security tips for safer browsing"},"content":{"rendered":"<section><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone\" alt=\"\" src=\"https:\/\/i0.wp.com\/zapt0.staticworld.net\/images\/article\/2013\/03\/chromesecurity_primary-100029482-large.jpg?resize=580%2C388\" width=\"580\" height=\"388\" \/>There&#8217;s a lot to like about Google Chrome&#8217;s built-in security features. The browser offers unique sandboxing functions and privilege restrictions, and even updates itself in the background to help better protect you from hackers and malware. But like all browsers, Chrome is imperfect, and there are steps you can take to protect it from attack. Here&#8217;s how to get the most from Chrome&#8217;s built-in security features, and work around its security shortcomings.<\/p>\n<h2>Privacy features<\/h2>\n<p>Chrome offers several privacy features that help protect you while you browse. The most notable are its phishing- and malware-protection schemes, and a tool that can auto-correct misspelled Web addresses.<br \/>\nChrome&#8217;s phishing and malware protection put up a warning screen whenever you visit a website that Google has identified as potentially malicious, whether it spreads malware or tries to steal your personal information. Meanwhile, Chrome&#8217;s URL autocorrect feature usees a Google-provided online service to fix misspelled URLS to help you avoid visiting the wrong site\u2014and perhaps a nefarious site\u2014by accident. Indeed, &#8220;<a href=\"http:\/\/mashable.com\/2012\/02\/16\/typosquatting-sites-shutdown\/\">typosquatting<\/a>&#8221; is still a threat.<\/p>\n<figure><a href=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/03\/privacysettings-100029242-orig.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/03\/privacysettings-100029242-large.png?resize=580%2C391\" width=\"580\" height=\"391\" border=\"0\" \/><\/a><figcaption>Chrome has several useful features that can help you avoid dangerous sites.<\/figcaption><\/figure>\n<p>To use these features, open the browser&#8217;s <em>Settings<\/em> panel and scroll down to the Privacy section (you may need to click <em>Show advanced settings<\/em>\u00a0to get there), and check the boxes labeled <em>Use a web service to help resolve navigation errors<\/em>\u00a0and <em>Use a web service to help resolve spelling errors<\/em>. Also, be sure to check the <em>Enable phishing and malware protection<\/em> box.<br \/>\nAdditionally, click the <em>Content settings<\/em> tab and consider restricting some content. You can, for example, disable JavaScript (which is often exploited by malware) and plug-ins. When you do so, Chrome will notify you when a site is using them so that you can\u00a0voluntarily\u00a0opt in for legitimate sites.<\/p>\n<figure><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/03\/chromejssetings-100029480-large.png?resize=580%2C604\" width=\"580\" height=\"604\" \/><figcaption>Restricting and limiting Web content can help block some types of malware attacks.<\/figcaption><\/figure>\n<h2>Protect your saved passwords and credit card details<\/h2>\n<p>If you let Chrome save your website passwords, anyone who uses your PC can easily access them with a little poking around in the Settings panel. But unlike Firefox and its Master password feature, Chrome\u2014and by extension, third-party add-ons\u2014won&#8217;t let you encrypt your passwords or saved credit card information.<br \/>\nLuckily, there are a few things you can do to help protect your privacy. First, don&#8217;t allow people you don\u2019t trust to use your Windows user account. Instead, either create a new Standard (non-administrative) account for others to use or turn on the Guest account.<\/p>\n<figure><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/03\/savedpasswords-100029245-large.png?resize=580%2C551\" width=\"580\" height=\"551\" border=\"0\" \/><figcaption>It&#8217;s ridiculously easy for someone to get at your saved passwords in Chrome.<\/figcaption><\/figure>\n<p>If creating another Windows account is too inconvenient, consider using a Chrome extension like\u00a0<a href=\"https:\/\/chrome.google.com\/webstore\/detail\/chromepw\/oeiimoikalhhgfhfkfhngehekefpiaag\">ChromePW<\/a>,\u00a0<a href=\"https:\/\/chrome.google.com\/webstore\/detail\/browser-lock\/ofilhkhdoiamdkbgciniekmdgjehaadm\">Browser Lock<\/a>, or <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/secure-profile\/eddeeogaiodnhfkingpegpmhpdiifbgh\">Secure Profile<\/a> to password-protect Chrome. This effectively forces others to use another browser on your system like Internet Explorer (which doesn\u2019t let others easily view your saved passwords) or Firefox (which lets you encrypt and password-protect your saved passwords).<br \/>\nAnother option is to securely store your sensitive data using a third-party password manager. Some third-party password tools let you sync your passwords across other browsers, which might be helpful if you go from one computer to another. <a href=\"http:\/\/www.pcworld.com\/article\/2026547\/review-keepass-makes-strong-passwords-and-keeps-them-safe.html\">KeePass<\/a> and <a href=\"http:\/\/www.pcworld.com\/article\/2013681\/review-xmarks-works-in-various-browsers-and-oss-to-sync-your-bookmarks.html\">Xmarks<\/a> are two popular password managers worth trying.<\/p>\n<h2>Secure your synced data<\/h2>\n<p>Chrome can sync most of your settings and saved data (including passwords, but not credit card details) across multiple computers and devices that have Chrome installed, but this creates a security vulnerability. By default, Chrome requires you to enter only\u00a0your Google account password to set up a new computer or device to sync your browsing data. So if your Google account password were hacked, an intruder could potentially access a list of all your passwords.<\/p>\n<figure><a href=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/03\/syncsettings-100029241-orig.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/03\/syncsettings-100029241-medium.png?resize=300%2C250\" width=\"300\" height=\"250\" border=\"0\" \/><\/a><figcaption>Adjusting your sync settings can better protect the data that Chrome saves.<\/figcaption><\/figure>\n<p>That is, unless you set a custom encryption syncing passphrase.<br \/>\nOnce you set a syncing passphrase, you have to first sign in with your Google account password and then enter the passphrase to set up new synced devices. This adds an important extra layer of security. To set this up, open <em>Settings<\/em>, click <em>Advanced sync settings<\/em>, and select <em>Choose my own passphrase<\/em>.<br \/>\nWhile you\u2019re there, also consider turning on encryption for all synced data instead of just passwords.<\/p>\n<h2>Secure your Google account<\/h2>\n<p>Google offers several security features to help you better control and protect your account, and you should definitely consider using them if you use Chrome&#8217;s sync feature. They help secure your entire Google account, so you should also consider using these security features if you tap into multiple Google services.<br \/>\nOn the <a href=\"https:\/\/www.google.com\/settings\/security\">Google Account Security<\/a> page, consider enabling Google&#8217;s 2-step Verification. Once you&#8217;ve done that, you\u2019ll have to enter a special code\u2014which you&#8217;ll receive via text, voice call, or the Google app\u2014whenever you attempt to sign in to Google from a new PC or mobile device. This scheme ensures that anyone without direct, hands-on access to your mobile hardware will be denied entry into your Google data. When signing in to applications or features that don\u2019t support the verification codes (like Chrome&#8217;s sync feature), you\u2019ll have to sign in to your Google account, access the 2-step Verification settings, and generate an application-specific password.<\/p>\n<figure><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/03\/accountsecurity-100029243-large.png?resize=580%2C608\" width=\"580\" height=\"608\" border=\"0\" \/><figcaption>Google offers many security features and functions so you can better protect your account.<\/figcaption><\/figure>\n<p>While on the <a href=\"https:\/\/www.google.com\/settings\/security\">Google Account Security<\/a> page, you might also want to turn on email and\/or phone notifications for password changes and suspicious log-in attempts. This way, you&#8217;ll know right away if someone tries to change your password or attempts to log in to your account without your knowledge.<br \/>\nAdditionally, review your recovery options in case you forget your password in the future. Last, review your authorized apps and sites and remove those you don\u2019t use anymore.<\/p>\n<h2>Install extensions for additional protection<\/h2>\n<p>We reviewed many of the security features offered by Google and Chrome, but various extensions allow you to add even more security functions. For example,\u00a0<a href=\"https:\/\/chrome.google.com\/webstore\/detail\/wot\/bhmmomiinigofkjcapegjjndpbikblnp\">Web of Trust (WOT)<\/a> can warn you of dangerous sites, and <a href=\"https:\/\/chrome.google.com\/extensions\/detail\/gighmmpiobklfepjocnamgkkbiglidom\">ADBlock<\/a> can remove annoying or malicious advertisements that can lead to malware or phishing sites. <a href=\"https:\/\/chrome.google.com\/extensions\/detail\/jkncfnbcgbclefkbknfdbngiegdppgdd\">View Thru<\/a> lets you see the destination of shortened URLs, and <a href=\"https:\/\/chrome.google.com\/extensions\/detail\/flcpelgcagfhfoegekianiofphddckof\">KB SSL Enforcer<\/a> can help you take advantage of HTTPS\/SSL encryption on sites that support it. <a href=\"https:\/\/chrome.google.com\/extensions\/detail\/pgkcfihepeihdlfphbndagmompiakeci\"><br \/>\n<\/a><br \/>\nvia <a href=\"http:\/\/www.pcworld.com\/article\/2030873\/google-chrome-best-security-tips-for-safer-browsing.html\" target=\"_blank\">PCWorld<\/a><br \/>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s a lot to like about Google Chrome&#8217;s built-in security features. The browser offers unique sandboxing functions and privilege restrictions, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[7,9],"tags":[424,425,849,950],"class_list":["post-1435","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-google","tag-google-chrome","tag-privacy","tag-security-2"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/papNkV-n9","jetpack-related-posts":[{"id":9938,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/05\/16\/google-antitrust-ruling-breakdown-what-this-means-for-chrome-and-search\/","url_meta":{"origin":1435,"position":0},"title":"Google Antitrust Ruling Breakdown &#8211; What This Means for Chrome and Search","author":"NCCT","date":"May 16, 2025","format":false,"excerpt":"https:\/\/youtu.be\/ELXjmrnN1uM The panel breaks down the antitrust ruling that could force Google to sell Chrome, stop paying Apple billions for default search placement, and fundamentally reshape the internet. This is just one explosive topic from This Week in Tech - we also discuss AI's environmental impact and the government's security\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ELXjmrnN1uM\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9330,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/04\/03\/security-now-657-protonmail\/","url_meta":{"origin":1435,"position":1},"title":"Security Now 657: ProtonMail","author":"NCCT","date":"April 3, 2018","format":false,"excerpt":"https:\/\/youtu.be\/OeSZg-ph3Ns This week we discuss \"DrupalGeddon2\", Cloudflare's new DNS offering, a reminder about GRC's DNS Benchmark, Microsoft's Meltdown meltdown, the persistent iOS QR Code flaw and its long-awaited v11.3 update, another VPN user IP leak, more bug bounty news, an ill-fated-seeming new eMail initiative, Free electricity, a policy change at\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/OeSZg-ph3Ns\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9511,"url":"https:\/\/nccomputertech.com\/techtalk\/2019\/01\/22\/millsplain-it-to-me-this-week-in-tech-702\/","url_meta":{"origin":1435,"position":2},"title":"Millsplain It to Me &#8211; This Week in Tech 702","author":"NCCT","date":"January 22, 2019","format":false,"excerpt":"https:\/\/youtu.be\/EtTfFJVBZ6s -Apple's Tim Cook Calls for Data Privacy. -773M Passwords Pwned - How to Find Out If Yours Was. -Amazon Tries to Make Alexa Sound \"Newsy.\" -Google Buys Fossil. -74% of Facebook Users are Clueless. -Facebook's 10 Year Challenge. -Atari Founder Making Alexa Board Games. -Stop Using Windows Phone! -Tokyo\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/EtTfFJVBZ6s\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9930,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/05\/16\/fbi-says-toss-your-old-router\/","url_meta":{"origin":1435,"position":3},"title":"FBI Says Toss Your Old Router","author":"NCCT","date":"May 16, 2025","format":false,"excerpt":"https:\/\/youtu.be\/scR199zRjvA On Security Now, Steve talks about the FBI's suggestion that we should be tossing out our old routers.","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/scR199zRjvA\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9452,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/11\/19\/internal-bug-discovery-security-now-693\/","url_meta":{"origin":1435,"position":4},"title":"Internal Bug Discovery &#8211; Security Now 693","author":"NCCT","date":"November 19, 2018","format":false,"excerpt":"https:\/\/youtu.be\/ClVI9PMQGCY Australia vs Encryption, Google+ Bugs Hasten its Demise -- Australia's recently passed anti-encryption legislation -- Details of a couple more mega-breaches including a bit of Marriott follow-up -- A welcome call for legislation from Microsoft -- A new twist on online advertising click fraud -- The DHS is interested\u2026","rel":"","context":"In &quot;Microsoft&quot;","block_context":{"text":"Microsoft","link":"https:\/\/nccomputertech.com\/techtalk\/category\/microsoft\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ClVI9PMQGCY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9297,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/02\/11\/this-week-in-tech-653-x-stands-for-nothing\/","url_meta":{"origin":1435,"position":5},"title":"This Week in Tech 653: X Stands for Nothing","author":"NCCT","date":"February 11, 2018","format":false,"excerpt":"https:\/\/youtu.be\/9vdjtG9ozeQ HomePod should have been delayed longer. Elon Musk's rollercoaster week: Falcon Heavy sends a Tesla to Mars just as Tesla has its worst quarter ever. iPhone boot code leaked online. Chrome will shame insecure websites. YouTube suspends Logan Paul for generally being a horrible human being. Rethinking Facebook and\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/9vdjtG9ozeQ\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/1435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/comments?post=1435"}],"version-history":[{"count":0,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/1435\/revisions"}],"wp:attachment":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/media?parent=1435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/categories?post=1435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/tags?post=1435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}