  {"id":1183,"date":"2025-11-19T16:31:28","date_gmt":"2025-11-19T21:31:28","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=1183"},"modified":"2026-02-17T10:32:56","modified_gmt":"2026-02-17T15:32:56","slug":"critical-security-alert-chrome-based-web-browsers","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2025\/11\/19\/critical-security-alert-chrome-based-web-browsers\/","title":{"rendered":"Critical Security Alert: Required Update for All Chrome-Based Web Browsers"},"content":{"rendered":"<h2>What is happening?<\/h2>\n<p>A critical security flaw has been discovered in <strong>Google Chrome<\/strong> that is currently being used by hackers to attack devices.<\/p>\n<h3><strong>The Risk:<\/strong><\/h3>\n<p>Simply visiting a malicious website can allow attackers to get access to your accounts through the web browser.<\/p>\n<h3><strong>The Impact:<\/strong><\/h3>\n<p>This can lead to the theft of your passwords, access to your logged-in accounts (like email or banking), or the installation of malicious software.<\/p>\n<p><strong>This affects Windows, Mac, and Linux computers and Android mobile devices. <\/strong>We recommend everyone update their web browsers immediately to stay safe.<\/p>\n<p><strong>Note:<\/strong> University-owned devices will update automatically. Just follow any on-screen prompts if your computer asks you to confirm or restart.<\/p>\n<hr \/>\n<h2><strong>Action Required: Follow the steps for your device below<\/strong><\/h2>\n<h3><strong>1. Windows &amp; macOS Users (Laptop\/Desktop)<\/strong><\/h3>\n<p><em>Applies to: Google Chrome, Microsoft Edge, Brave, Opera<\/em><\/p>\n<h4><strong>For Google Chrome:<\/strong><\/h4>\n<ol>\n<li>Open Chrome.<\/li>\n<li>Click the <strong>three vertical dots (\u22ee)<\/strong> in the top-right corner.<\/li>\n<li>Select<strong> Help &gt; About Google Chrome.<\/strong><\/li>\n<li>The browser will automatically check for updates.<\/li>\n<li><strong>CRITICAL:<\/strong> Once the download finishes, click the <strong>&#8220;Relaunch&#8221; <\/strong>button. The update is not active until you restart the browser.<\/li>\n<\/ol>\n<h4><strong>For Microsoft Edge:<\/strong><\/h4>\n<ol>\n<li>Click the<strong> three dots (&#8230;)<\/strong> in the top-right.<\/li>\n<li>Go to<strong> Help and feedback<\/strong> \u2192\u00a0<strong>About Microsoft Edge.<\/strong><\/li>\n<li>Wait for the update to install, then click <strong>Restart.<\/strong><\/li>\n<\/ol>\n<p><strong>Verification: <\/strong>After restarting, go back to the &#8220;About&#8221; page. It should say &#8220;Chrome is up to date&#8221; (Version <strong>142.0.xxxx<\/strong> or higher).<\/p>\n<hr \/>\n<h3><strong>2. Android Users (Samsung, Pixel, etc.)<\/strong><\/h3>\n<p><em>Applies to: Chrome on Android<\/em><\/p>\n<ol>\n<li>Open the <strong>Google Play Store<\/strong> app on your phone.<\/li>\n<li>Tap your <strong>Profile Icon<\/strong>\u00a0(top right corner).<\/li>\n<li>Tap <strong>Manage apps &amp; device.<\/strong><\/li>\n<li>Tap <strong>Updates available.<\/strong><\/li>\n<li>Find <strong>Google Chrome<\/strong> in the list and tap <strong>Update.<\/strong><\/li>\n<\/ol>\n<p><em>Note: If you use Microsoft Edge on Android, update that as well.<\/em><\/p>\n<div class=\"prpl-drawer\"><div class=\"prpl-drawer-header\">FAQ<\/div><div class=\"prpl-drawer-content\">\n<h3><strong>What is the Chromium vulnerability everyone is talking about?<\/strong><\/h3>\n<p><span style=\"font-weight: 400\">A recently discovered security flaw in Chromium (the engine behind Chrome, Edge, Brave, etc.) could allow attackers to run harmful code or steal information if a user visits a malicious website. The browser makers have released a security patch to fix it.<\/span><\/p>\n<h3>Does this affect Chrome, Edge, and other browsers, or just one?<\/h3>\n<p><span style=\"font-weight: 400\">It affects any browser built on Chromium \u2014 this includes Google Chrome, Microsoft Edge, Opera, Brave, and others. All of them need to be updated.<\/span><\/p>\n<h3>What does this vulnerability allow attackers to do?<\/h3>\n<p><span style=\"font-weight: 400\">If exploited, an attacker could potentially crash your browser, run unauthorized code, or redirect you to malicious content. In most cases, exploitation requires visiting a harmful website.<\/span><\/p>\n<h3>Does this vulnerability put my university account or data at risk?<\/h3>\n<p><span style=\"font-weight: 400\">Potentially \u2014 if your browser is out of date and you visit a malicious site, attackers may attempt to exploit the bug. Updating your browser fully protects you.<\/span><\/p>\n<h3>Is this connected to phishing or malware we\u2019ve seen on campus?<\/h3>\n<p><span style=\"font-weight: 400\">Not directly. However, attackers often combine browser vulnerabilities with phishing or fake links, so staying updated helps reduce your risk overall.<\/span><\/p>\n<h3>Could my computer be compromised if I use campus Wi-Fi?<\/h3>\n<p><span style=\"font-weight: 400\">No \u2014 the Wi-Fi isn\u2019t the issue. The risk comes from running an outdated browser. Updating your browser eliminates the vulnerability regardless of where you connect.<\/span><\/p>\n<h3>How do I know if my Chrome\/Edge browser is up to date?<\/h3>\n<p><strong>Chrome:<\/strong><span style=\"font-weight: 400\"> Go to Settings \u2192 About Chrome. It will automatically check and update.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><strong>Edge:<\/strong><span style=\"font-weight: 400\"> Go to Settings \u2192 About Microsoft Edge. It will update there as well.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"> Once it shows \u201cUp to date,\u201d you\u2019re good.<\/span><\/p>\n<h3>Do university-owned computers update automatically?<\/h3>\n<p><span style=\"font-weight: 400\">Yes, most university-managed computers receive updates automatically. Users may still see a prompt to restart the browser \u2014 clicking &#8220;Relaunch&#8221; completes the update.<\/span><\/p>\n<h3>Do I need to restart my browser or my computer?<\/h3>\n<p><span style=\"font-weight: 400\">Yes. The update doesn\u2019t fully apply until you relaunch the browser. A computer restart isn\u2019t required, but it doesn\u2019t hurt.<\/span><\/p>\n<h3>What version number should I look for to confirm I\u2019m safe?<\/h3>\n<p><span style=\"font-weight: 400\">Look for the latest version your browser provides after updating. The \u201cAbout\u201d page will also tell you if you need to relaunch to finish installing the security patch.<\/span><\/p>\n<h3>What should I do if I think my browser was exploited?<\/h3>\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Update your browser immediately.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Run a malware scan.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Change your passwords if you notice unusual behavior.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reach out to the IT Service Desk if anything seems off \u2014 we can check your device.<\/span><\/li>\n<\/ol>\n<h3>Is it still safe to browse the web while waiting for the update?<\/h3>\n<p><span style=\"font-weight: 400\">It\u2019s best to update before browsing. The process only takes a minute. Avoid clicking unknown links until your browser is fully patched.<\/span><\/p>\n<h3>Do I need to change my passwords after this vulnerability?<\/h3>\n<p><span style=\"font-weight: 400\">Not unless you experienced strange behavior (unexpected logins, pop-ups, browser crashes). Staying updated is the key protective step.<\/span><\/p>\n<h3>Who do I contact if the update won\u2019t install?<\/h3>\n<p><span style=\"font-weight: 400\">Contact the <a href=\"https:\/\/www.montclair.edu\/information-technology\/it-service-desk\/\">IT Service Desk<\/a>. They can remote in or guide you through a manual update.<\/span><\/p>\n<h3>Can IT push the update to my device?<\/h3>\n<p><span style=\"font-weight: 400\">For university-managed machines, yes \u2014 IT can deploy or verify updates. Personally owned devices must be updated by the user.<\/span><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is happening? A critical security flaw has been discovered in Google Chrome that is currently being used by hackers to attack devices. The Risk: Simply visiting a malicious website can allow attackers to get access to your accounts through the web browser. The Impact: This can lead to the theft of your passwords, access [&hellip;]<\/p>\n","protected":false},"author":349,"featured_media":1184,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1183","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/comments?post=1183"}],"version-history":[{"count":10,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1183\/revisions"}],"predecessor-version":[{"id":1191,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/1183\/revisions\/1191"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media\/1184"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media?parent=1183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/categories?post=1183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/tags?post=1183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}