Back in March, NSS Labs has revealed shocking statistics which suggested that Internet Explorer 8 had best effectiveness results against malware.
As of today, Neowin reports that NSS Labs has yet again tested all web browsers to find out which one has best built-in protection against phishing.
Tested web browsers:
Internet Explorer 8
Opera 10 Beta Continue Reading
Starting from August 11th, nightly builds of Camino web browser now includes integrated phishing and malware protection.
The following feature is based on Google Safe Browsing service which is being used by Firefox, Chrome and Safari web browsers as well.
As for their competitors, Opera is using Netcraft, PhishTank and Haute Secure services while Internet Explorer has its own SmartScreen Filter.
The latest Google Chrome 2 release has fixed 2 security vulnerabilities. As H Online reports: “The first vulnerability could be used by an attacker to run arbitrary code within the Google Chrome sandbox.”
Furthermore, critical memory corruption vulnerability was also fixed which could have caused browser to crash and possibly allowing attacker to run arbitrary code with the privileges of the logged in user.
For some more details, you can always visit H Online.
Thanks to mabdul for sending this.
- Microsoft Changes IE8 Default Browser Settings
- US State Dept. workers beg Clinton for Firefox
- Glass-enabled tab bar (Aero) in Opera
- Opera Unite Struggles to Keep up With Its Ambitions
- 3D animations coming to Safari
- Google Chrome Gestures Extension
- DOM flaw can crash many browsers
- Shorten long URLs with thurly
Thanks to Daniel Hendrycks, mabdul and Nox for links.
Soon enough we will see Firefox 3.5.1 release as Mozilla is working hard to fix the critical security flaw.
Type about:config in the location bar
An analysis done by Microsoft between Google Chrome 2.0, Firefox 3.0 and Internet Explorer 8 shows that IE8 wins in 7 out of 10 categories, while 3 are draw.
So let’s analyze the categories. Continue Reading
The latest Chrome version 18.104.22.168 and Safari 4.0 has fixed one of the vulnerabilities which was exploited in WebKit earlier this month.
As H Online describes: A vulnerability in WebKit can be exploited by an attacker to crash a tab or execute arbitrary code in Google Chrome due to a memory corruption issue in WebKit’s handling of recursion in certain DOM event handlers. For an attack to be successful, a victim must first visit a maliciously crafted website. The malicious code, however, will be sandboxed, limiting the damage that an attacker can do when exploiting the vulnerability.
Thanks to mabdul for sending this.
- WordPress users may want to avoid Microsoft’s new Internet Explorer 8
- Look out IE, Firefox, Chrome is getting much better
- Windows 7 gives Firefox 3, IE8 speed boosts, while Firefox 3.5 slows down
- Mozilla marks June for Firefox 3.5 release candidate
- Firefox Mobile (Fennec) Alpha Up for Windows Mobile Testing
- Google’s Chrome was ‘hackable’ at Pwn2Own contest
- Chrome-on-Mac precursor rough but workable
- Opera Employee Blogging Policies
- Your browser talks too much: How surfers can protect private info
- Should Microsoft even bother with Internet Explorer 9?
- Why Firefox Is My Preferred Browser
- 10 handy Firefox about:config hacks
- Mozilla ‘Prism’ Brings Web Apps to Desktop
- Safari, Opera Users Lag Behind in Security Updates
- Are Mobile Web Browsers Even Necessary?
- Mach5 Windows Mobile web browser gives Skyfire some competition