Bitdefender disables Anti-Exploit monitoring in Chrome

A few days ago, Google Chrome started implementing alerts for programs that could cause conflicts with your browser. This alarm occurs when the browser fails and issues a message to the user to delete the listed programs as they are considered “incompatible applications”.

Bitdefender, Bitdefender disables Anti-Exploit monitoring in Chrome, Optocrypto

To the surprise of many, anti-virus programs such as malware bytes, bit defenders, AVG and Kaspersky have fallen into this classification, a Google spokesman explained that this is because such applications inject code or linking functions into chrome to detect browser threats such as malicious downloads, websites or exploits.

Faced with this situation, these companies were asked about the measures they have taken to classify Google Chrome, and at the moment some are looking for a productive solution for both, others have adapted to Google’s changes, while some companies like Bitdefender have decided to eliminate their product.

This information was known to e-threat’s lead analyst, Bogdan Botezatu, who mentioned that from August 20, Bitdefender will no longer monitor Chrome 66 and will later stop using its anti-exploit technology.

A Kaspersky Lab spokesman said they need to insert code into Chrome because it helps them identify the various threats, so they are still looking for a solution for both companies:

“We contacted Google to find a solution and are still looking for possible solutions to this problem. Inserting our code into the Chrome browser is an important part of the overall Internet security concept. For example, it is important that a secure input function attempts to steal sensitive data such as credit card number, login, and password if malware (keylogger) is installed on the user’s devices.

Pedro Bustamante, Vice President of Products and Research for Malwarebytes, says Google Chrome does not scan the applications that cause a crash but compares the installed applications with a “blacklist” on which the applications are located:

“In the current implementation, Chrome does not really check whether or not the incompatible application is causing errors. They simply take a list of popular applications and add them to their warnings, whether these applications cause blockages, conflicts or other problems.

Another possible solution would be that only verified suppliers could inject the code, which would eliminate the disadvantage of both signatures and protect the user.

“There is absolutely no logical reason for her to take this approach. You must stop the code injection, only allow injection to verified security vendors, or at least check whether an application is injected or not before it is marked as “incompatible”.

Avast / AVG, for its part, has decided to adapt its products to the new chrome guidelines.

“We have solved this problem and our products are not reported by Chrome.

As we see, many “solutions” have been adopted by the various companies, but Google Chrome has not announced an exact solution that makes both companies happy, such as creating a whitelist in which only antiviruses are found.

Bitdefender, Bitdefender disables Anti-Exploit monitoring in Chrome, Optocrypto

Meet David, the visionary CEO of Optocrypto, a dynamic leader at the forefront of technological innovation. With an unwavering passion for the ever-evolving world of technology, David is dedicated to unraveling the myriad benefits of the latest advancements. As a seasoned professional, he brings a wealth of expertise to the table, steering Optocrypto toward new heights of success.