Archives - Chrome


Powerwash your Chromebook before giving it away

For security and convenience, one of Chrome OS’s major benefits is its ability to integrate seamlessly with your Google Account. However, you should make sure to close out all connections if you choose to pass the device on to a trusted friend or family member. From Settings, scroll down to the section labeled “Advanced” and […]

Hide the bookmarks bar on Chrome before sharing your browser

Keep your browser looking tidy and prevent the exposure of personal information when you share your screen with Chrome. Remove your bookmark bar temporarily by right-clicking it, then unselect “Show bookmarks bar.” To bring it back up, simply select the vertical ellipsis menu in the upper right corner, hover over “Bookmarks” and then select, “Show […]

Verify that your version of Chrome is up to date

Ensuring that your web browser is up to date is an important step toward guarding against the latest security threats online. To check if you’re using the latest version of Chrome, select the vertical ellipsis in the upper right corner of your browser. Either you’ll see an option that reads “Update Google Chrome,” or you’re […]

Disable auto-fill in Chrome

If you share your computer with other people, even if you don’t have passwords saved, they could still learn a lot of personal information from your auto-fill options. To disable this feature in Chrome, navigate to the Autofill section from the Settings page. Select the section you want to turn off, whether it’s passwords, payment […]

Check for reused passwords in Chrome

It’s advisable to never reuse passwords. If one is exposed in a data breach, hackers may use it to attempt to gain access to other accounts of yours. If you use Chrome’s built-in password manager, they’ll tell you if you’ve reused a password without realizing it. To check, go to your Google Account page and […]

Beware: Chrome malicious plugins

Hackers buy chrome plugins in order to turn them into malware. Virus developers put their hands on legitimate and popular plugins and turn them into hacking tools, specifically because the plugins are considered legitimate, most antivirus programs do not detect their activity. So how can you identify the affected plugins and dispose them? It is […]