Google Chrome Rolls Out Memory, Energy Saver Modes for Desktops: All Details

Google Chrome is rolling out the Memory Saver and Energy Saver modes, which were announced last year, on Chrome for desktops. The features are now available on Mac, Windows, Linux, and Chromebooks and are turned on by default. Both Memory and Energy saver mode will boost the desktop’s performance, as well provide better battery life while using Google’s browser. Memory Saver mode will automatically free up memory from inactive tabs, while the Energy Saver feature will reduce battery consumption by limiting background activity. The modes, if not needed, can be turned off in Chrome Settings.

According to a report by 9To5Google, Google, which first introduced the Memory and Energy Saver modes in December 2022, is now rolling out the features widely to Chrome 110 for Mac, Windows, Linux, as well as Chromebooks. The features prioritise the active tabs and limit the background activities to free memory and reduce power consumption.

As per the details shared on Google’s support page, the Memory Saver and Energy Saver modes are enabled by default. Users can disable them by going to Chrome’s settings, in the Performances tab on the sidebar. Google explained that Memory saver will help users save space as well as run active tabs smoothly by deactivating inactive tabs.

When a user is not using a tab actively, Memory saver mode will change it into inactive mode. The activity status will change as and when the user will browse the tab again. It will display a ‘Tab Active Again’ message once the inactive tab is accessed.

On the other hand, the Energy saver mode will reduce the power consumption of device and offer improved battery life. It will do so by reduce the image capture rate and other background tasks. It automatically works when the device is running low on battery and is unplugged. If the device is plugged in to energy source and being charged, the Energy Save mode will be turned off. The mode will be displayed on title bar with a leaf and an electric signal.

 


Affiliate links may be automatically generated – see our ethics statement for details.

For details of the latest launches and news from Samsung, Xiaomi, Realme, OnePlus, Oppo and other companies at the Mobile World Congress in Barcelona, visit our MWC 2023 hub.


EU’s Pending Banking Law Calls for Fast-Track Crypto Capital Rules for Banks

Featured video of the day

Samsung’s Experiential Store

Check out our Latest News and Follow us at Facebook

Original Source

Chrome for Windows, Mac, Linux Updates With 4 High-Risk Vulnerability Fixes

Google has released Chrome version 102.0.5005.115 for Windows, Mac, and Linux. The new release fixes a total of seven security vulnerabilities — of which, four are marked highly severe. The update is rolling out to desktop users across Windows, macOS and Linux platforms over the coming days. India’s Computer Emergency Response Team (CERT-In) and the United States Cybersecurity and Infrastructure Agency (CISA) have urged users to install the latest Chrome release on their systems to prevent the reported issues.

The four security issues that are rated with high severity are tracked as CVE-2022-2007, CVE-2022-2008, CVE-2022-2010, and CVE-2022-2011, as Google explained in a blog post.

The vulnerability that is tracked as CVE-2022-2007 is a Use-After-Free (UAF) vulnerability, which exists in the WebGPU to API and allows attackers to hack by exploiting incorrect use of dynamic memory. The CVE-2022-2008 flaw, on the other hand, results in out-of-bounds memory access in WebGL.

Chrome’s compositing component is also found to have the CVE-2022-2010 issue, which is an out-of-bounds read vulnerability. The last high-risk vulnerability, CVE-2022-2011, is a use after free flaw in ANGLE engine abstraction layer.

Although Google has detailed the four highly severe issues, it has not provided public access to the details as a large number of users are yet to bring the fix.

“We will also retain restrictions if the bug exists in a third-party library that other projects similarly depend on, but haven’t yet fixed,” the company said.

In response to the public disclosure from Google, CERT-In has released a vulnerability note to urge users to install the latest update.

“Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code on the targeted system,” the advisory by the nodal agency said.

The CISA has also encouraged users and administrators to apply the update on their systems.

Users can check for the latest release on their Windows, Mac, and Linux systems by going to Chrome > About Google Chrome. The update can also be installed by clicking on the three-dot button from the right-most corner and then Help > About Google Chrome.


Check out our Latest News and Follow us at Facebook

Original Source

Exit mobile version