Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows
    Cybersecurity

    Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

    adminBy adminApril 10, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Device Bound Session Credentials
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 10, 2026Malware / Browser Security

    Device Bound Session Credentials

    Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta.

    The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome release.

    “This project represents a significant step forward in our ongoing efforts to combat session theft, which remains a prevalent threat in the modern security landscape,” Google’s Chrome and Account Security teams said in a Thursday post.

    Session theft involves the covert exfiltration of session cookies from the web browser, either by gathering existing ones or waiting for a victim to log in to an account, to an attacker-controlled server.

    Typically, this happens when users inadvertently download information-stealing malware into their systems. These stealer malware families – of which there are many, such as Atomic, Lumma, and Vidar Stealer – come with capabilities to harvest a wide range of information from compromised systems, including cookies.

    Because session cookies often have extended lifespans, attackers can leverage them to gain unauthorized access to victims’ online accounts without having to know their passwords. Once collected, these tokens are packaged and sold to other threat actors for financial gain. Cybercriminals who acquire them can follow up with their attacks of their own.

    DBSC, first announced by Google in April 2024, aims to counter this abuse by cryptographically tying the authentication session to a specific device. In doing so, the idea is to render cookies worthless even if they get stolen by malware.

    “It does this using hardware-backed security modules, such as the Trusted Platform Module (TPM) on Windows and the Secure Enclave on macOS, to generate a unique public/private key pair that cannot be exported from the machine,” Google explained.

    “The issuance of new short-lived session cookies is contingent upon Chrome proving possession of the corresponding private key to the server. Because attackers cannot steal this key, any exfiltrated cookies quickly expire and become useless to those attackers.”

    In the event a user’s device does not support secure key storage, DBSC gracefully falls back to standard behavior without breaking the authentication flow, Google said in its developer documentation.

    The tech giant said it has observed a significant reduction in session theft since its launch, an early indication of the success of the countermeasure. The official launch is just the start, as the company plans to bring DBSC to a broader range of devices and introduce advanced capabilities to better integrate with enterprise environments.

    Google, which worked with Microsoft to design the standard with an aim to make it an open web standard, also emphasized that the DBSC architecture is private by design and that the distinct key approach ensures that websites cannot use the session credentials to correlate a user’s activity across different sessions or sites on the same device.

    “Furthermore, the protocol is designed to be lean: it does not leak device identifiers or attestation data to the server beyond the per-session public key required to certify proof of possession,” it added. “This minimal information exchange ensures DBSC helps secure sessions without enabling cross-site tracking or acting as a device fingerprinting mechanism.”

    block Chrome DBSC Google rolls session theft Windows
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleSamsung Galaxy Z Fold 7 gets a surprise price hike in the US
    Next Article This 9/10-rated gaming keyboard is now more affordable, and it’s a steal at this price
    admin
    • Website

    Related Posts

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Cisco says critical Webex Services flaw requires customer action

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026

    Gemini blocked more than 99% of bad ads before they ran in 2025

    April 16, 2026

    I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell

    April 16, 2026

    IBM unveils security services for thwarting agentic attacks, automating threat assessment

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,346)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (826)
    • Tech Tools & Mobile / Apps (1,611)
    • WiFi / Internet & Networking (226)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026

    Gemini blocked more than 99% of bad ads before they ran in 2025

    April 16, 2026

    I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell

    April 16, 2026
    Most Popular
    • OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal
    • Gemini blocked more than 99% of bad ads before they ran in 2025
    • I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell
    • IBM unveils security services for thwarting agentic attacks, automating threat assessment
    • What Is Answer Engine Optimization? And How to Do It
    • Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger
    • COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.