Security Blog
The latest news and insights from Google on security and safety on the Internet
Reject the Unexpected - Content Security Policy in Gmail
16. december 2014
Posted by Danesh Irani, Software Engineer, Gmail Security
(Cross-posted from the
Gmail Blog
)
We know that the safety and reliability of your Gmail is super important to you, which is why we’re always working on security improvements like
serving images through secure proxy servers
, and
requiring HTTPS
. Today, Gmail on the desktop is becoming more secure with support for Content Security Policy (CSP). CSP helps provide a layer of defense against a common class of security vulnerabilities known as cross-site scripting (XSS).
There are many great extensions for Gmail. Unfortunately, there are also some extensions that behave badly, loading code which interferes with your Gmail session, or which compromises your email’s security. Gmail’s CSP helps protect you, by making it more difficult to load unsafe code into Gmail.
Most popular (and well-behaved) extensions have already been updated to work with the CSP standard, but if you happen to have any trouble with an extension, try installing its latest version from your browser’s web store (for example,
the Chrome Web Store
for Chrome users).
CSP is just another example of how Gmail can help make your email experience safer. For advice and tools that help keep you safe across the web, you can always visit the
Google Security Center
.
This post was updated on December 18th to add a description of the XSS defense benefit of CSP, and to more precisely define the interaction with extensions.
Ingen kommentarer :
Send en kommentar
Etiketter
#sharethemicincyber
#supplychain #security #opensource
android
android security
android tr
app security
big data
biometrics
blackhat
C++
chrome
chrome enterprise
chrome security
connected devices
CTF
diversity
encryption
federated learning
fuzzing
Gboard
google play
google play protect
hacking
interoperability
iot security
kubernetes
linux kernel
memory safety
Open Source
pha family highlights
pixel
privacy
private compute core
Rowhammer
rust
Security
security rewards program
sigstore
spyware
supply chain
targeted spyware
tensor
Titan M2
VDP
vulnerabilities
workshop
Archive
2025
jan.
2024
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2023
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2022
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2021
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2020
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2019
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2018
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2017
dec.
nov.
okt.
sep.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2016
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2015
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2014
dec.
nov.
okt.
sep.
aug.
jul.
jun.
apr.
mar.
feb.
jan.
2013
dec.
nov.
okt.
aug.
jun.
maj
apr.
mar.
feb.
jan.
2012
dec.
sep.
aug.
jun.
maj
apr.
mar.
feb.
jan.
2011
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
2010
nov.
okt.
sep.
aug.
jul.
maj
apr.
mar.
2009
nov.
okt.
aug.
jul.
jun.
mar.
2008
dec.
nov.
okt.
aug.
jul.
maj
feb.
2007
nov.
okt.
sep.
jul.
jun.
maj
Feed
Follow @google
Follow
Give us feedback in our
Product Forums
.
Ingen kommentarer :
Send en kommentar