New Chrome version released – 11.0.696.68

Posted by cyber-geek | Posted in Be Informed on Cyber Security | Posted on 13-05-2011

0

As expected, Google released its new version v11.0.696.68, after the claims from VUPEN security researchers to have pwned Chrome. The new version of Chrome comes with the updated Adobe Flash Player 10.3.

As a reply to the claims on pwn of Chrome, security researcher Dan Kaminksy said that if VUPEN used vulnerability in Flash to bypass sandbox, then it is not the Chrome hack… Continue reading

Security Vulnerability found in Google Chrome Running on Windows

Posted by cyber-geek | Posted in Be Informed on Cyber Security | Posted on 11-05-2011

0

The most secure features of Google Chrome, including Sandbox, ASLR and DEP, were simply bypassed by VUPEN security researchers. The vulnerability is for the most latest version of Google Chrome (v11.0.696.65) for Windows.

The vulnerability is found to be impacting all Windows based computers running 32 bit as well as 64 bit OS. The vulnerability was exploited by just making the user visit a… Continue reading

Latest Versions of Chrome and Firefox Released

Posted by cyber-geek | Posted in Be Informed on Cyber Security | Posted on 02-03-2011

0

Google had released latest version for Chrome (9.0.597.107) fixing around 19 bugs on Monday. And within no time Mozilla has also come up with latest version of Firefox (3.6.14).

Interestingly, these were released just before the Pwn2Own hacking contest (to be starting on March 9th). Even in 2010, Google released 4.1.249.1036 version, days before the contest. Apple also had released updates for Safari in 2010 in… Continue reading

Vulnerabilities Found in Google Chrome

Posted by cyber-geek | Posted in Be Informed on Cyber Security | Posted on 31-01-2011

0

Secunia has recently released an security advisory on Google Chrome asking users to update to the latest version (8.0.552.237) of the browser. According to the advisory, multiple vulnerabilities have been found on the browser that can be exploited by malicious people to manipulate certain data and potentially compromise a user’s system.

The vulnerabilities are as follows:
1) An unspecified error exists within the extensions notification handling.

2)… Continue reading