Google will include a new security function to Chrome OS, the firm’s web-supported OS that fuels its Chromebooks machines. The new function, dubbed as USBGuard, will ban authorization to the USB port access while the screen of the device is locked. As per a source code commit of Chrome OS located by media previously this week, the new function is presently accessible in Canary builds of Chrome OS and is likely to land in the stable edition of Chrome OS shortly.
Once this takes place, consumers can turn in on it by changing the “chrome://flags/#enable-usbguard” Chrome OS flag. The way this security function is designed to operate is by stopping the SO from executing or reading any code when the screen is locked and a USB is connected. Google took this safety measure to stop Rubber Ducky-akin attacks. A Rubber Ducky is a popular term employed to define a malicious thumb drive that when connected to device runs malicious commands and mimics a keyboard.
On a related note, Chrome operating system has had Android applications for a while, and as such has Android Nougat operating as a subsystem inside Chrome OS. And now, when Nougat is 2 years old at this point, the firm is restoring it will be Android 9.0 Pie instead of Android 8.0 Oreo. Android Pie has a lot of expanded features and enhancements within its layers for Chromebooks to enjoy. And while the media update for Chromebooks to have Pie has a lot to disclose about just what the Chrome OS team will be taking benefit of, there are a few modification that are quite obvious in the new edition.
The interface of the Settings application on the new release (as shown media reports) is quite akin to what you would see on Android phones or tablets and, honestly, has a lot more dead space as compared to earlier version.