Two Techniques for Improving Google Chrome Security

Although most Mac users rely on Apple’s Safari for Web browsing, plenty of people prefer Google Chrome for its cross-platform compatibility, massive collection of extensions, and tight integration with the Google ecosystem. Chrome is by far the most popular browser in the world, with about 65% of the market, compared to Safari’s 18%. Still others opt for alternative browsers based on the same open-source Chromium engine, such as Arc, Brave, Microsoft Edge, Opera, and Vivaldi.

Unfortunately, Chrome’s dominance makes it a target for attackers in two ways. First, attackers may attempt to find vulnerabilities that would let them steal data or compromise credentials. Second, although Google reviews extensions submitted to the Chrome Web Store, researchers have discovered malicious extensions with millions of downloads. To keep your copy of Chrome secure, we recommend two things: relaunch the browser regularly and be careful with extensions.

Relaunch Chrome to Install Updates

Google Chrome and all the other Chromium-based browsers update themselves automatically. Sort of. While the browser is running, it downloads the latest update but doesn’t install it until you quit and relaunch. Since both macOS and most apps are highly reliable, many people go weeks or even months without relaunching, leaving Chrome vulnerable to recent security exploits. You can check if you’re running the latest version or need to install an update by choosing Chrome > About Google Chrome. (Some extensions, like 1Password, even refuse to run when an update is required.)

In other words, it’s important that you quit and relaunch Chrome and any other Chromium browsers regularly—we recommend a weekly schedule to match Google’s schedule for security updates. There’s no need to worry about losing your open tabs as long as you set Chrome to “Continue where you left off” in Chrome > Settings > On Startup. All the Chromium-based browsers have a similar setting. (While we’re on the topic, remember that it’s also a good idea to restart your Mac occasionally!)

There is one exception among the alternative browsers: Arc. Its developers have figured out how to download and install updates automatically. The feature is still being rolled out to all users, but when enabled, it installs updates when the Mac wakes from sleep rather than forcing the user to quit and relaunch.

Be Careful with Chrome Extensions

Chrome extensions can be both a blessing and a curse. There are vastly more Chrome extensions than Safari extensions, so Chrome and the Chromium browsers enjoy added features that Safari lacks. On the downside, in 2023, researchers discovered dozens of malicious extensions with tens of millions of combined downloads. Google has removed all of them, but many had been on the Chrome Web Store for 6 months or more.

There are over 100,000 extensions in the Chrome Web Store, so while malicious extensions are real, most extensions are legitimate. But if Google can miss them for months or years, how can you reduce the chances of installing something evil? Here’s what we do:

  • Reduce the number of extensions you install: The fewer extensions you install, the less likely one is to be malicious or cause other problems. Regularly uninstall any extensions you don’t use from Window > Extensions (the location may vary slightly in the Chromium browsers).
  • Only install from the Chrome Web Store: Stick to extensions that have at least gone through Google’s reviews for the Chrome Web Store and avoid direct downloads for extensions.
  • Read reviews before installing: Although reviews are no guarantee, if you see people complaining about unusual behavior, that may be a clue that the extension is doing something sketchy.
  • Evaluate extension metadata: In general, avoid extensions that aren’t used by many people, that don’t have many reviews, or that aren’t updated frequently. Those aren’t guaranteed signals of a malicious extension but may be a hint to be cautious.
  • Review permissions before installing: When you click the Add to Chrome button in the Chrome Web Store, a prompt explains what permissions will be granted to the extension. If they seem unnecessarily broad, cancel the installation.

Don’t stress too much about this. Maintaining good Chrome security comes down to relaunching the browser once a week and being careful about which extensions you use—it’s easy.

(Featured image based on an original by iStock.com/ArtemisDiana)


Social Media: If you use Google Chrome or another Chromium browser instead of Safari, you can stay secure by following two simple rules regarding updates and extensions.

More Insights

Tech Article

Understanding New MacBook Battery Charging Features

The just-released macOS 26.4 Tahoe introduced two battery-related features for MacBook users, helping them understand and control MacBook charging. A Slow Charger indicator now appears in the battery status menu and in Battery settings when your Mac is connected to a charger that isn’t delivering the minimum recommended wattage. More significantly, a new Charge Limit […]

Read More »
Tech Article

View Suspicious Documents Safely with Dangerzone

A standard piece of advice for staying safe online is to avoid opening attachments from people you don’t know or attachments that seem suspicious. It’s good advice, since PDFs and office documents can contain JavaScript and macros that present a security risk, or they could be maliciously crafted to take advantage of vulnerabilities in common […]

Read More »
Tech Tip

Create AI-Powered Playlists with iOS 26.4’s Playlist Playground

Apple Music subscribers running iOS 26.4 can use the new Playlist Playground feature to create AI-generated playlists tailored to any mood, genre, activity, or era. To try it on your iPhone, open the Music app, tap the Library tab, tap the + button, then tap Create New Playlist. Instead of manually adding songs, tap the […]

Read More »
Tech Article

Two iPhone Exploit Kits Mean You Should Update iOS Now

The discovery of two sophisticated iPhone exploit kits—DarkSword and Coruna—within weeks of each other signals a troubling shift. Unlike previous spyware attacks that targeted high-profile users, these exploit kits have been deployed via compromised legitimate websites, so anyone who visits an infected site could fall victim, with no additional clicks or downloads required. This suggests […]

Read More »
Tech Tip

Intel-Based Apps Will Stop Working in macOS 28

Yes, we know we’re still on macOS 26. In 2025, Apple announced macOS 27 would be the last version to support Rosetta for most Intel-based apps. (Beyond that, Apple will maintain a subset of Rosetta functionality for older, unmaintained gaming titles.) This fact has become relevant because in the just-released macOS 26.4, when you launch […]

Read More »
Tech Tip

Apple Refreshes Studio Display and Introduces Studio Display XDR

Apple has updated its Studio Display with an improved 12-megapixel Center Stage camera with Desk View support, two Thunderbolt 5 ports, and improved bass from its six-speaker system—all for the same $1,599 starting price. More significantly, Apple introduced the Studio Display XDR at $3,299, bringing professional-grade HDR technology to a broader audience at a much […]

Read More »

If you are here and not sure how to proceed, please call us at 626-286-2350, and we would be happy to help you find a solution to your needs.