Friday, March 31, 2023

Google Chrome is the most unsafe browser for 2022

It’s not a secret that Google Chrome isn’t an unsafe browser, but a new study from Atlas VPN explains why. People who use Google Chrome must become careful, and people who use Firefox shouldn’t think they’re safe, as the evidence shows.

The analysis says that by 2022, Google Chrome, which is the most popular web browser, will also be the most vulnerable. So far in 2018, more than 303 bugs have been found, bringing the total number of bugs to 3,159. The data came from the VulDB database, which keeps track of vulnerabilities. The numbers cover the time period from January to October 2022.

Google Chrome only has new holes found in it in the first few days of October which is why it is the most unsafe browser. These are the new ones: CVE-2022-3318, CVE-2022-3314, CVE-2022-3311, CVE-3309, and CVE-3022-3307.

At the moment, there is no information about these specific vulnerabilities. However, the CVE program keeps an eye on security holes across many platforms. Atlas VPN says that these problems could mess up your computer’s memory.

Google has fixed all of these security issues in version 106.0.5249.61, which is now available.

Mozilla Firefox came in second when it came to security flaws. Up until October 2022, more than 117 vulnerabilities were found. Microsoft Edge had 103 vulnerabilities, which is 61% more than the year before. It has had 806 security problems since it first came out.

Read more: Twitter will now let you tweet photos, videos, and GIFs

In 2022, Safari has one of the fewest holes, right after Chrome. So far in 2022, only 26 problems out of a total of 1139 have happened. So far, no problems with Opera are already doing fine, bringing the total to 344.

You should know that Chrome, Edge, and Opera are all based on Chromium. This means that security flaws in one browser can affect the other two. The Chromium open-source project makes the code for all of these browsers. However, different companies build browsers in different ways, so not all vulnerabilities do share.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
Latest news
Would love your thoughts, please comment.x