Could you give me a bit more information on Google Chrome Frame security? Our organization operates several legacy...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
applications that have to run on outdated versions of IE. Is Google Chrome Frame a viable way to bolster security across the enterprise?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Google Chrome Frame is a plug-in for Internet Explorer versions 6-9 that gives users “access to the latest HTML5 features as well as Google Chrome’s performance and security features.” Google Chrome Frame will improve the security of older browsers when visiting a website that opts to use the plug-in, but won’t affect the security for the rest of the Internet. This allows users to continue to use their current version of Internet Explorer while benefiting from the functional advantages of Google Chrome Frame. This will not significantly improve security, since it is unlikely that a malicious website will target Google Chrome Frame to exploit rather than exploiting the version of Internet Explorer in use.
There is a similar project called IE Tab that may improve security more than Google Chrome Frame. IE Tab is a Web browser plug-in for Google Chrome or Firefox that uses Internet Explorer to display a webpage in a tab in Chrome. It can be configured so IE Tab always opens certain URLs, such as your legacy applications or websites requiring IE. This sets the system so IE can still be used for some trusted websites, although employees are no longer browsing the Internet using old versions of Internet Explorer. Users may benefit from using a more secure Web browser and still sustain the advantages of an older, more insecure version of Internet Explorer.
Dig Deeper on Web browser security
Related Q&A from Nick Lewis
The OurMine hacking group recently used DNS poisoning to attack WikiLeaks and take over its web address. Learn how this attack was performed from ...continue reading
Typosquatting was used by threat actors to spread malware in the NPM registry. Learn from expert Nick Lewis how this method was used and what it ...continue reading
Threat actors are using phishing email campaigns to fool users with tech support scams and fake Blue Screens of Death. Learn how these campaigns work...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.