Feeds

Google teaches Chrome Canary to sing when it sniffs dodgy downloads

Bleeding-edge browser shoots down malware on sightsmell

Intelligent flash storage arrays

Google has equipped its experimental "Canary" distribution of the Chrome web browser with a malware-spotting capability to protect users from malicious downloads.

The security upgrade was announced by Google on Thursday and means the browser will scan downloaded executable files for the presence of viruses and Trojans, and notify punters if it finds any.

"In the current Canary build of Chrome, we’ll automatically block downloads of malware that we detect," the advertising giant said. "If you see this message in the download tray at the bottom of your screen, you can click 'Dismiss' knowing Chrome is working to keep you safe. "

Canary is the bleeding-edge version of the Chrome browser and receives nightly updates. Google cautions users that it's "not for the faint of heart" as it can be "prone to breakage".

This vulture has been using Chrome Canary as one of his three primary browsers for several months and can testify that it can break in confusing and infuriating ways from time to time.

That said, it tends to be extremely fast and seems to have a mildly smaller memory footprint than stock Chrome.

Along with the malware-sniffing feature, Google has also added a "reset browser settings" button into stock Chrome tht lets you roll the browser back to its original state in case you catch a dash of browser-distorting malware. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.