- Firefox 3 about to get a major update
- Please tell me Firefox won’t ever look like this on first run. (Picture)
- Seeking web security, exploit operators prefer Firefox, Opera comes second
- Google Chrome 4 reveals the beginnings of cloud synchronization
- Xmarks extension alpha for Chrome arrives
- HTML 5 and timed media
Thanks to Chrome, Nox and Opera for links.
Here are some more details from Ars Tecnica, which should clarify Microsoft and NSS Labs “sponsorship” deal.
In terms of sponsorship of the reports, “this stuff is expensive to do right, and we need to monetize it somehow,” Moy told Ars. “We invited Google, Mozilla, Apple, Opera to participate, but they didn’t even bother to respond, except for Opera, which stated they “don’t really focus on malware.”
Also, readers have noticed that Firefox 3.5 was not included in those tests, here is a reason (as from .pdf).
We would have liked to have been able to test Firefox 3.5 which was released on June 30, 2009, and attempted to test it alongside the other browsers. However, serious instability where the browser repeatedly crashed (a widely reported issue) along with poor results prevented its inclusion for the sake of fairness.
For NSS Security Test results, see the following page.
The Register writes:
Microsoft might be closer to a compromise with browser rival regarding Internet Explorer on Windows, but access to key online services for PCs could be the next hurdle.
Opera Software chief executive told The Reg he welcomed Microsoft’s offer last month to give European PC users a choice of browsers on Windows, but he warned of “problems” if rival browsers don’t get equal access to crucial sites that help keep users’ PCs secure and updated.
Back in March, NSS Labs has revealed shocking statistics which suggested that Internet Explorer 8 had best effectiveness results against malware.
As of today, Neowin reports that NSS Labs has yet again tested all web browsers to find out which one has best built-in protection against phishing.
Tested web browsers:
Internet Explorer 8
Opera 10 Beta Continue Reading
Starting from August 11th, nightly builds of Camino web browser now includes integrated phishing and malware protection.
The following feature is based on Google Safe Browsing service which is being used by Firefox, Chrome and Safari web browsers as well.
As for their competitors, Opera is using Netcraft, PhishTank and Haute Secure services while Internet Explorer has its own SmartScreen Filter.
The latest Google Chrome 2 release has fixed 2 security vulnerabilities. As H Online reports: “The first vulnerability could be used by an attacker to run arbitrary code within the Google Chrome sandbox.”
Furthermore, critical memory corruption vulnerability was also fixed which could have caused browser to crash and possibly allowing attacker to run arbitrary code with the privileges of the logged in user.
For some more details, you can always visit H Online.
Thanks to mabdul for sending this.
- Microsoft Changes IE8 Default Browser Settings
- US State Dept. workers beg Clinton for Firefox
- Glass-enabled tab bar (Aero) in Opera
- Opera Unite Struggles to Keep up With Its Ambitions
- 3D animations coming to Safari
- Google Chrome Gestures Extension
- DOM flaw can crash many browsers
- Shorten long URLs with thurly
Thanks to Daniel Hendrycks, mabdul and Nox for links.
Soon enough we will see Firefox 3.5.1 release as Mozilla is working hard to fix the critical security flaw.
Type about:config in the location bar
An analysis done by Microsoft between Google Chrome 2.0, Firefox 3.0 and Internet Explorer 8 shows that IE8 wins in 7 out of 10 categories, while 3 are draw.
So let’s analyze the categories. Continue Reading
The latest Chrome version 18.104.22.168 and Safari 4.0 has fixed one of the vulnerabilities which was exploited in WebKit earlier this month.
As H Online describes: A vulnerability in WebKit can be exploited by an attacker to crash a tab or execute arbitrary code in Google Chrome due to a memory corruption issue in WebKit’s handling of recursion in certain DOM event handlers. For an attack to be successful, a victim must first visit a maliciously crafted website. The malicious code, however, will be sandboxed, limiting the damage that an attacker can do when exploiting the vulnerability.
Thanks to mabdul for sending this.