Google allows its users to synchronize its Google Chrome tabs, which has become quite a fascination for them. By synchronizing the tabs, Google Chrome allows the users to access the saved tabs anywhere. For example, tabs saved on the home PC could be accessed on PCs at work and even users’ mobiles. Users are advised to be precautious, as the data is accessible not only by them!
Malware – a spy tool for employers
Malware is a computer monitoring software, which has the capacity to engulf large volume of data at a given time. Employers make frequent use of this spy software, to track the activities of their employees at work. This spyware acts like the cell phone spy software. The spy software installed in the employees’ computers would monitor the amount of work accomplished by them, similar to any cell phone monitoring software.
However, tab-synchronization of Google Chrome is a double treat for the employers, as with this option they are able to monitor their sub-ordinates’ activities on their computers at work and home. This can be easily done by infecting either one of the computers at home or office.
BYOB – security against Google Chrome tabs
Synchronization of Google Chrome tabs attracts potential hackers like bees to honey. Likewise, Google Chrome has come up with a malicious threat of BYOB, meaning Bring Your Own Browsers. Although, BYOD – Bring Your Own Devices also track data by linking work and personal computers, BYOB has more damaging effects, as it does not need a physical medium to connect. The damage cannot be controlled by the IT department, as the personal computers of the employees are out of their reach.
To date, the threat is hypothetical, as no malware has been traced; but Google Chrome’s latest version can be cause of double jeopardy for the users. The first step is to create potential threat for the home computer by transferring a saved data like a bookmark setting to an infected site. The infected file will spread to the PC when the browser is opened. This paves way for the hacker to infect work computer and eventually the spy software diffuses into the entire computer network at work while contaminating the data.
Possible second threat comes from the hacker if the malware installs an affected file from Google Chrome. There are high risks while installing items from Chrome Web Store, as it is easily accessible by anyone. Hence, it is necessary that only those items should be installed that are highly recommended from trusted people.
Word of Caution