Now here is something quite informative. Browser Security Handbook published by Google.
As Google explains, the document is meant to provide web application developers, browser engineers, and information security researchers with a one-stop reference to key security properties of contemporary web browsers.
The following browsers are included: Continue Reading
- Google dumps Firefox from download bundle, swaps in Chrome
- Fennec/Mobile Firefox coming to Symbian S60 in 2009
- Time for Mac Antivirus? Apple Safari Users Targeted on Facebook
- Microsoft Gets More Detailed About IE Vulnerability and Workarounds
- Skyfire rolls out UK mobile browser
- Net Applications again: Opera vs. Chrome – actual numbers vs. claimed market share
Internet Explorer 8 — Microsoft’s latest release, currently at the Beta 2 stage — was declared to be the safest (aka more secure than Firefox 3.1 Beta and Chrome Beta) but the least popular browser, according to a browser security survey.
On Wednesday, Utest, a social-networking and software testing company, announced the results of its Bug Battle browser contest. The event included participation from 1,330 security pros, hobbyists and tech enthusiasts, who found an alarming 672 bugs in the world’s top three Web browsers. Continue Reading
BitDefender has identified this new bit of holiday cheer as Trojan.PWS.ChromeInject.A.”
The trojan installs itself into Firefox’s add-on directory, registers itself as Greasemonkey, and begins searching your hard drive for passwords, login details, your World of WarCraft account information, and your library card number.
Once installed, the trojan is capable of identifying over 100 web sites. When an infected user visits a site the trojan recognizes, the parasite comes to life and records the login/password details being transmitted. Presumably it then goes back to sleep, quietly keeping an eye on further system activity.
For more details, check original post by ArsTechnica.
US-CERT is aware of a vulnerability that affects the Google Chrome web browser. This vulnerability is due to a default configuration that allows files to be downloaded without prompting the user. In addition, downloaded files can be opened with a single click, which could allow a user to inadvertently open a malicious file.
US-CERT encourages users to enable the “Ask where to save each file before downloading” option within the “Minor Tweaks” tab in the browser preferences. Continue Reading
Time for yet another web browsers security article. So there’s a test called “Browser Security Test” which I found today and decided to run it on the latest stable web browsers releases. What about results?
Firefox 2.0.14 – All Passed
Firefox 3.0 – All Passed Continue Reading
Some time ago we’ve posted an article about web browsers security which is based on Secunia reports.
Well, before the Firefox 3 release, it’s time to check how web browsers (latest “stable” versions) are doing now (2nd round).
It looks like there are some issues with the Firefox 2 Vietnamese Language Pack 2.0. According to bugzilla.mozilla.org, file contains malicious code. Language pack author PC was infected with the virus so it can’t directly affect you. However, you will still see banner ads.
I wonder if anyone from Mozilla is *really* running some checks before releasing add-ons and/or language packs to public…
News and Reviews about Your Favorite Web Browser. Subscribe to our RSS Feed.
Just a few days ago (with the Firefox 126.96.36.199 release), “Directory Traversal Vulnerability” was supposed to be fixed. However, as it’s noted here, by the guy who discovered new security vulnerability, it wasn’t fully fixed. Here’s a quote from his blog:
Because directory traversal through plugins is all nice and such, we don’t need it. We can trick Firefox itself in traversing directories back.