Lucian Constantin
CSO Senior Writer

Chrome for MacOS to block rogue ad injections and settings changes

news
Mar 2, 20172 mins

The Google Safe Browsing service has been expanded to detect more threats on MacOS

p1200734
Credit: Magdalena Petrova

Google has expanded its Safe Browsing service, allowing Google Chrome on MacOS to better protect users from programs that locally inject ads into webpages or that change the browser’s homepage and search settings.

The Safe Browsing service is used by Google’s search engine, as well as Google Chrome and Mozilla Firefox, to block users from accessing websites that host malicious code or malicious software. The service is also used in Chrome to scan downloaded files and block users from executing those that are flagged as malicious.

“Safe Browsing is broadening its protection of MacOS devices, enabling safer browsing experiences by improving defenses against unwanted software and malware targeting MacOS,” Google said in a blog post. “As a result, MacOS users may start seeing more warnings when they navigate to dangerous sites or download dangerous files.”

In particular, this new Safe Browsing expansion on MacOS targets applications that harm the user’s browsing experience. These are apps that use unauthorized methods to inject unwanted ads into web traffic or change the browser’s settings.

According to Google’s policies, applications can only interfere with the browser’s normal functionality through a Chrome extension published in the Chrome Web Store. Injecting ads into webpages through other programmatic means, deploying local proxies to intercept traffic or inserting user interface elements into webpages by patching the Chrome binary are considered violations of this policy.

Chrome for Windows has long provided a Settings API that allows extension developers to make legitimate changes to the browser’s settings. The same API has now been implemented in Chrome for MacOS.

“Starting March 31 2017, Chrome and Safe Browsing will warn users about software that attempts to modify Chrome settings without using the API,” Google said.

It’s not clear if this new policy might impact more than malicious programs. There are legitimate applications, such as antivirus programs, that use alternative programmatic techniques to intercept and inspect browser traffic.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author