Feeds

Google teaches Chrome Canary to sing when it sniffs dodgy downloads

Bleeding-edge browser shoots down malware on sightsmell

Next gen security for virtualised datacentres

Google has equipped its experimental "Canary" distribution of the Chrome web browser with a malware-spotting capability to protect users from malicious downloads.

The security upgrade was announced by Google on Thursday and means the browser will scan downloaded executable files for the presence of viruses and Trojans, and notify punters if it finds any.

"In the current Canary build of Chrome, we’ll automatically block downloads of malware that we detect," the advertising giant said. "If you see this message in the download tray at the bottom of your screen, you can click 'Dismiss' knowing Chrome is working to keep you safe. "

Canary is the bleeding-edge version of the Chrome browser and receives nightly updates. Google cautions users that it's "not for the faint of heart" as it can be "prone to breakage".

This vulture has been using Chrome Canary as one of his three primary browsers for several months and can testify that it can break in confusing and infuriating ways from time to time.

That said, it tends to be extremely fast and seems to have a mildly smaller memory footprint than stock Chrome.

Along with the malware-sniffing feature, Google has also added a "reset browser settings" button into stock Chrome tht lets you roll the browser back to its original state in case you catch a dash of browser-distorting malware. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.