Back in April, everyone was talking about “that Heartbleed thing”, now, it looks like the search giant has found a new exploit in the now 18 year’s old SSL 3.0 protocol, which is still supported in a lot of web browser and can also be used as a fallback in case newer protocols fail to connect.
How to fix it? Well, the server administrators could disable SSL 3.0 completely but that’s unlikely to happen anytime soon. As far as other solutions go, Google says that it can’t be fixed and there are no reasonable workarounds.
On a slightly positive note, it was discovered (and not fully revealed) by Google so no one knows how widespread it exactly is. So here you have it folks, an exploit that can’t be fixed.
More money, more security.
After squashing more than 700 Chrome security bugs and paying a total of $1.25 in rewards, the search giant has decided to encourage hackers even more.
Starting from July 1, 2014 (yes, they are going backwards as a special treat even though they announced it recently), Google is upping the maximum reward range from $5000 to $15,000, which is triple of what they used to pay (although there were always few exceptions such as last month’s $30,000 pay for what they call to be “a very impressive report”.
Aims to block even more malware.
Back in 2013, Google has announced a Safe Browsing filter, which improves user experience by automatically blocking malicious downloads. Now, the search giant has announced additional steps to combat deceptive software.
Starting next week, Google Chrome will also protect users from programs that are disguised as a helpful download, for example: the ones that change your home page or adjust other web browser settings.
Good bye, ActiveX.
In an effort to improve the overall browser security and reduce user frustration, the software giant has announced that it will start blocking outdated ActiveX controls starting August 12, 2014.
According to Microsoft, “Java exploits represented 84.6% to 98.5% of exploit kit-related detections each month in 2013” and “to help avoid this situation with ActiveX controls, an update to Internet Explorer on August 12, 2014 will introduce a new security feature, called out-of-date ActiveX control blocking.”
Say hello to BoringSSL.
After the recent Heartbleed bug paranoia, it looks like Google took a pretty significant step to minimize such risks in the future. According to the report, the search giant is replacing OpenSSL with its own BoringSSL (yes, they did call it like that) in an effort to streamline security patches and improve overall user security.
Silent mode for everything.
Recently, Opera followed other browsers and revealed a new build, which would automatically update your software to the latest version. Now, it looks like Norwegian browser maker has decided to go an extra mile and silence even more tasks, starting with the latest Developer build (23.0.1522.0), Opera will now scan your PC for other web browser installations / profiles and silently import all data (on the first run) without your permission, including: passwords, cookies, history and bookmarks.
Manages to surprise everyone as well.
After a recent discovery of Internet Explorer vulnerability, where attackers could take over your PC and install malicious software, the software giant has finally released a set of updates to address the overblown issue.
Why would you use XP anyway?
Due to a recently discovered Internet Explorer (6-11) vulnerability, which will likely be patched soon for all but Windows XP users, UK and US governments are advising users to switch to alternative web browsers.
Security firm FireEye have warned users that a group of hackers are already exploiting the vulnerability targeting Internet Explorer 9-11 and Adobe Flash, so in any case, you are better of using something else.
It looks like this year’s Pwn2Own hacking contest was pretty eventful and all web browsers got their asses kicked.
On the first day, a team from France has successfully hacked Internet Explorer 11, Firefox and Adobe Flash Player. The very same research firm also managed to find a vulnerability in Google Chrome, which affects both WebKit and Blink rendering engines.
Next day Sebastian Apelt and Andreas Schmidt have demonstrated a browser based exploit against Microsoft’s web browser, followed by a Chinese team that managed to bypass Safari’s sandbox and run remote code execution through it.
“Add to Feedly” and “Tweet this Page”.
Following the recent outrage that some companies are sneaking malware serving code into Google Chrome extensions that are updated silently, the search giant took some steps and removed at least two of them.
So how exactly did this happen? Well, according to Amit Agrawal, the guy behind “Add to Feedly” extension said that an unknown company has acquired his extension and inserted the malicious code afterwards.