Time to go back to IE?
Now here is something you won’t hear that often. Despite the common hate for Adobe’s Flash and Oracle’s Java plugins, it looks like they are not the major offenders when it comes to the actual number of vulnerabilities.
According to the latest report by security firm Secunia, Google Chrome, Firefox and iTunes are responsible for the majority of Windows security issues. As it turns out, 86% of all Windows vulnerabilities in 2012 (up from 78% last year) come from non-Microsoft applications and here is the actual list (vulnerabilities – product name):
No one cared about Safari.
With the Pwn2Own hacking contest coming to an end, it was revealed that every major web browser was hacked.
Google Chrome exploit allowed for a full breakout from its invincible sandbox resulting in a $100,000 reward, while both Firefox and Internet Explorer were exploited by a security firm VUPEN, resulting in a total of $160,000 in bounty payments ($60,000 and $100,000 respectively).
What about Safari? As it turns out, no one even pre-registered for Apple’s web browser this year despite the $75,000 prize.
Now here is an issue you haven’t heard about: as it turns out, both Firefox and Opera (to a lesser extent) are “leaking” your sensitive data, at least according to some reports.
The issue appears to be related to Speed Dial, which generates thumbnails of your favorite or most frequently visited web pages. As web browser takes a screenshot of the site, it does little to protect user’s privacy, especially when data is served over the SSL connection.
When it comes to the socially engineered malware, it looks like Microsoft’s Internet Explorer is the only web browser that manages to fight it well.
According to the latest study by NSS Labs, IE10 running on the Windows 8 protected test systems against 99.1% of all the malicious web pages, followed by Google’s Chrome 70.4% mark.
However, when it came to Firefox and Safari, the block rates were incredibly low, 4.2% and 4.3% respectively.
And a laptop.
Following the recent Pwnium 2 competition, a hacker nicknamed “Pinkie Pie”, has successfully compromised Google’s Chrome web browser and received a free Chromebook and a cash prize of $60,000.
Earlier this year, Pinkie Pie and Sergey Glazunov have also reaped a reward of $60,000, following the successful escape of everyone’s beloved sandbox.
Thanks to a recent security vulnerability discovery, the German government’s Federal Office for Information Security, has advised users to use alternative web browsers until Microsoft fixes the issue, “a fast spreading of the code has to be feared.”, said BSI.
Meanwhile, Yunsun Wee, Microsoft’s Trustworthy Computing spokesperson, said the the software giant is working on a fix and it should be available in the next few days.
Internet Explorer 10 is not affected.
Thanks to some clever engineering, a new attack has reportedly affected computers running IE7, IE8 and IE8 running on Windows XP, Vista and 7 machines.
According to the recent report, by utilizing Adobe’s Flash Player to conduct a “heap spray” and bypass Windows ASLR (Address Space Layout Randomization) protection, attackers have delivered “Poison Ivy” Trojan to unsuspecting victims.
Recently, Google has released a new stable build of its desktop web browser, which includes a new sandbox architecture.
Now, the search giant has shared some good news with its Android users as they too will be receiving a new build that strengthens web browser’s security.
According to the recent blog post, Chrome for Android sandbox was improved due to the multi-process architecture and Android’s User ID isolation technology.
Apache HTTP Server, a software that is widely used by more than 600 million web sites (that’s about 60% percent of the http client market share), has recently issued a patch, which overrides Internet Explorer’s DNT setting.
What does it mean? It means that the majority of all the web sites will ignore the Do Not Track setting by default.
The patch’s author, Adobe employee Roy T. Fielding, has said the following:
Phishing by the data URI.
According to a report from TheRegister, Henning Klevjer, a student from Norway, has modified a somewhat old phishing technique (documented by Billy Rios and Nathan McFeters), which allows phishers to hide the entire malicious web page and transform it into a clickable link.