473,382 Members | 1,386 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,382 software developers and data experts.

Serious Security Flaw in Google Chrome


Serious Security Flaw in Google Chrome:

http://www.readwriteweb.com/archives...gle_chrome.php

--
Guy Macon
<http://www.GuyMacon.com/>

Sep 6 '08 #1
1 2046
On 2008-09-06, John Bokma <jo**@castleamber.comwrote:
Guy Macon <http://www.GuyMacon.com/wrote:

>Serious Security Flaw in Google Chrome:

http://www.readwriteweb.com/archives...gle_chrome.php

"An attacker could easily trick users into launching an executable Java
file by combining a flaw in WebKit with a known Java bug and some smart
social engineering."

Old news [1], and certainly not serious. The most serious security flaw
are all those people *still* working with Windows with Administrator
rights. Some because they think they are "power users" (the correct term
is ignorant lusers), and some because an aforementioned "power user" has
configured their OS.
[1] I just explained to someone that when developing software, after some
time you freeze the code base. And if the release date is fixed (I am sure
that was the case here), it's just released, even if there is a very minor
security issue (which this is, anyone calling this serious is either
clueless, or trying to get more traffic)
Actually I think it was that "carpet bombing" issue that Microsoft were
having a bit of fun with in the press when it first appeared in Safari.

Apple had just rather sneakily installed Safari on a few million PCs by
bundling it into the small print of an iTunes update.

Soon after that when the "carpet bombing" problem was reported,
Microsoft responded by announcing serious-sounding warnings and
recommending people not to use Safari (which was brazen coming from
them, even for them).
Sep 6 '08 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
24
by: Bob Alston | last post by:
Could develop web pages that would interact with the access/jet database - like DAP but without the security flaw??? One of Access' competitors (Filemaker Pro as I recall) touts its EASY way to...
8
by: Matt Kruse | last post by:
http://news.zdnet.com/2100-1009_22-6121608.html Hackers claim zero-day flaw in Firefox 09 / 30 / 06 | By Joris Evers SAN DIEGO--The open-source Firefox Web browser is critically flawed in...
0
by: Guy Macon | last post by:
SRWare's new Iron browser is based on Chrome's source code but, unlike Chrome, Iron does not create unique user IDs, nor does it send URIs to Google for generating search hints or tell Google when...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.