Internet Explorer 10 is not affected.
Thanks to some clever engineering, a new attack has reportedly affected computers running IE7, IE8 and IE8 running on Windows XP, Vista and 7 machines.
According to the recent report, by utilizing Adobe’s Flash Player to conduct a “heap spray” and bypass Windows ASLR (Address Space Layout Randomization) protection, attackers have delivered “Poison Ivy” Trojan to unsuspecting victims.
Recently, Google has released a new stable build of its desktop web browser, which includes a new sandbox architecture.
Now, the search giant has shared some good news with its Android users as they too will be receiving a new build that strengthens web browser’s security.
According to the recent blog post, Chrome for Android sandbox was improved due to the multi-process architecture and Android’s User ID isolation technology.
Apache HTTP Server, a software that is widely used by more than 600 million web sites (that’s about 60% percent of the http client market share), has recently issued a patch, which overrides Internet Explorer’s DNT setting.
What does it mean? It means that the majority of all the web sites will ignore the Do Not Track setting by default.
The patch’s author, Adobe employee Roy T. Fielding, has said the following:
Phishing by the data URI.
According to a report from TheRegister, Henning Klevjer, a student from Norway, has modified a somewhat old phishing technique (documented by Billy Rios and Nathan McFeters), which allows phishers to hide the entire malicious web page and transform it into a clickable link.
Confirms their commitment on security.
Well, here is a potential chance for you to make millions of dollars, all you have to do is find dozens of exploits in the Google’s Chrome web browser and reap the rewards.
Even though Google has already paid more than $1 million dollars for bug reports, the search giant has recently announced that they will be increasing the budget for its Chromium Vulnerability Rewards Program. According to the official blog post, bug hunters will now receive a bonus of $1,000 or more for every security flaw discovered.
Windows and Linux only.
Thanks to a sharp focus, Google Chrome engineers are able to work just on a few, rather than dozen features at the same time, delivering stable rather than clunky web experience.
This is why we can’t have nice things.
Uplay, a browser plugin that appears on your PC once you install various Ubisoft games, has been discovered to have a serious security vulnerability, which allows malicious websites to take over your computer.
Now, according Mozilla’s blocked plug-Ins list, the open source organization took appropriate steps and has since blocked the mentioned crapware.
On a related note, Ubisoft has just updated its Uplay client to version 2.0.4, supposedly fixing the mentioned vulnerability.
As reported earlier, Google has bypassed the cookie settings in both Apple’s Safari and Microsoft’s Internet Explorer web browsers. Thankfully, it wasn’t left unnoticed by the Federal Trade Commission.
With Internet Explorer 10 and more.
If you are curious to see the upcoming IE10 browser in action, check the full Windows Phone 8 Summit video above. Not interested in everything? No worries, browsers start at: 15:00 and 39:00!
Alternatively, check our recent post about the very same presentation.