Jump to content

How secure is your browser?


Recommended Posts

Firefox Nightly x64 builds.

I've always found the Fanboy filters to be far too overly aggressive. They also used to block a lot of images and other things that were totally safe on websites (recommended/affiliate websites - basically friend type websites).

Fanboy's main filters are now adblocks easy list. So sad.

this is what it showed when I visited their webpage...

It might be because Seamonkey is the king. Seamonkey 2.25 with Noscript turned off.

SeaMonkey.bmp

Link to comment
Share on other sites


It might be because Seamonkey is the king. Seamonkey 2.25 with Noscript turned off.

It might be the "king", but I'm quite happy using Chrome and it's variants and miss one point in the security area, and gain in overall to 87 vs 15 for Seamonkey. :)

Cheers and Regards

Link to comment
Share on other sites

It might be because Seamonkey is the king. Seamonkey 2.25 with Noscript turned off.

It might be the "king", but I'm quite happy using Chrome and it's variants and miss one point in the security area, and gain in overall to 87 vs 15 for Seamonkey. :)

Cheers and Regards

That was because I did the security test only. I ran all the tests and got an 86.

SeaMonkey2.bmp

Link to comment
Share on other sites

Then I guess COMODO Dragon beats Seamonkey:

5mmqgo.jpg

Security - 16

Overall - 87

The king is dead! Long live the king! LOL

Cheers and Regards

Not if I can find some addons to level the field :P . In all seriousness though Chrome is a very good browser that I like a lot. I personally use Chromium over chrome for open source reasons. (doesn't change the fact that I still, prefer seamonkey for its stability though)

Link to comment
Share on other sites

No problem. I like Seamonkey as well. :) As to which variant of Chrome I like, I used to use SRWare Iron, but now I use COMODO Dragon, that's what the above tests were based on.

Cheers and Regards

Link to comment
Share on other sites

this tests make no sense at all tho

ACID - just site style (css) - this shouldn't be security test

rich text - wtf... how is this security test ?

selectors API - again wtf... how is this security test ?

in fact

the only security thing should be based on JS, sandboxed/non-sandboxed plugins and specific known backdoors (whatever they are) and probably memory overflow

but behold the above huge scores based on what ?

Edited by vinifera
Link to comment
Share on other sites

this tests make no sense at all tho

ACID - just site style (css) - this shouldn't be security test

rich text - wtf... how is this security test ?

selectors API - again wtf... how is this security test ?

in fact

the only security thing should be based on JS, sandboxed/non-sandboxed plugins and specific known backdoors (whatever they are) and probably memory overflow

but behold the above huge scores based on what ?

Security has its own section. Browser scopes test all sections of a browser then gives it a score out off 100 so you can compare. Security included. If you want to see what the security test are here is a pic.

(I clicked the security tab to show the security tests the site does)

post-386997-0-71975900-1397100586_thumb.

Link to comment
Share on other sites

  • 3 weeks later...

Thank you Lostinspace for sharing this bug with us. I'm cross cross posting your post here. http://www.msfn.org/board/topic/171670-internet-explorer-bug-puts-quarter-of-web-users-at-risk/

Microsoft Corp is rushing to fix a bug in its widely used Internet Explorer web browser after a computer security firm disclosed the flaw over the weekend, saying hackers have already exploited it in attacks on some U.S. companies.

Microsoft disclosed on Saturday its plans to fix the bug, which targets Internet Explorer versions 9 through 11.

Those versions take up 26.25 percent of the browser market, according to FireEye, the cybersecurity software company that caught the bug.

The bug, however, reportedly affects versions 6 through 11. Together, those versions dominate desktop browsing, accounting for 55 percent of the PC browser market, according to tech research firm NetMarketShare.

PCs running Windows XP will not receive any updates fixing that bug when they are released, however, because Microsoft stopped supporting the 13-year-old operating system earlier this month.

Security firms estimate that between 15 and 25 percent of the world's PCs still run Windows XP.

FireEye Inc said that a sophisticated group of hackers have been exploiting the bug in a campaign dubbed 'Operation Clandestine Fox.'

FireEye, whose Mandiant division helps companies respond to cyber attacks, declined to name specific victims or identify the group of hackers, saying that an investigation into the matter is still active. It described the hackers as 'extremely proficient at lateral movement' and 'difficult to track.'

'It's a campaign of targeted attacks seemingly against U.S.-based firms, currently tied to defense and financial sectors,' FireEye spokesman Vitor De Souza said via email. 'It's unclear what the motives of this attack group are, at this point. It appears to be broad-spectrum intel gathering.'

He declined to elaborate, though he said one way to protect against them would be to switch to another browser.

Microsoft said in the advisory that the vulnerability could allow a hacker to take complete control of an affected system, then do things such as viewing changing, or deleting data, installing malicious programs, or creating accounts that would give hackers full user rights.

FireEye and Microsoft have not provided much information about the security flaw or the approach that hackers could use to figure out how to exploit it, said Aviv Raff, chief technology officer of cybersecurity firm Seculert.

Yet other groups of hackers are now racing to learn more about it so they can launch similar attacks before Microsoft prepares a security update, Raff said.

'Microsoft should move fast,' he said. 'This will snowball.'

Still, he cautioned that Windows XP users will not benefit from that update since Microsoft has just halted support for that product.

The software maker said in a statement to Reuters that it advises Windows XP users to upgrade to one of two most recently versions of its operating system, Windows 7 or 8.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...