Entry tags:
Run Windows Update. NOW.
Seriously, there's a major security hole in Internet Explorer that also opens up vulnerabilities in other browsers. Even if you rarely if ever use IE, you need to secure your system if you're running Windows. If you don't know how to, Yahoo! Tech has a handy guide. It's fairly major, several popular websites have been hijacked, one well known webcomic artist got infected while looking at his own comic. MS normally only patch at scheduled times, for them to rush something out this quickly is almost unheard of: renderer memory buffer as IE. No, I don't really understand that bit either. So Opera gets downgraded.
If you're still using Internet Explorer for your browsing, really, it's NOT SAFE. No browser is completely secure, but IE is part of the core operating system of Windows, and when there are unpatched exploits, the attack can get directly into Windows itself. By far the safest way to browse[1] is with Firefox, and it's probably tied after that between Apple's Safari and Google's Chrome. Opera remains a groundbreaking bit of software, but if the default behaviour is still to pretend to be IE and also open up vulnerabilities regardless, it isn't as good as it should be.
For the full security shield, Firefox has plugins such as Flashblock, Adblock and NoScript that really do push it to the top. At the very least, Flashblock stops system hogging flash from hijacking your browsing unless you want it to, it's the first thing I install after Fx on a new machine. Always.
Another part of this vulnerability involved Adobe's Acrobat Reader. PDFs are, unfortunately, now a part of life, and there are still many many idiots that put their PDFs online and think they've got a decent web presence. Given this, the PDF download plugin for Firefox is essential, and switching to a much faster and less system intensive reader (I use Foxit) for your default PDF setup is probably a good plan as well.
[1] I'm ignoring text only and other lite browsers such as Lynx here, just talking about normal, standard plays YouTube vids and looks normal browsers.
Acting with record speed, Microsoft has issued a patch for the just-announced security flaw that impacts all recent versions of Internet Explorer, from version 5 to the latest betas of IE 8. The next security update had not been due from the company until January 13, making this a very rare occurrence.Most scary? Up until now, I had thought Opera was a pretty good browser, it's certainly nice to use. It appears though that Opera was subject to the same vulnerabilities as it uses the same XML
If you're still using Internet Explorer for your browsing, really, it's NOT SAFE. No browser is completely secure, but IE is part of the core operating system of Windows, and when there are unpatched exploits, the attack can get directly into Windows itself. By far the safest way to browse[1] is with Firefox, and it's probably tied after that between Apple's Safari and Google's Chrome. Opera remains a groundbreaking bit of software, but if the default behaviour is still to pretend to be IE and also open up vulnerabilities regardless, it isn't as good as it should be.
For the full security shield, Firefox has plugins such as Flashblock, Adblock and NoScript that really do push it to the top. At the very least, Flashblock stops system hogging flash from hijacking your browsing unless you want it to, it's the first thing I install after Fx on a new machine. Always.
Another part of this vulnerability involved Adobe's Acrobat Reader. PDFs are, unfortunately, now a part of life, and there are still many many idiots that put their PDFs online and think they've got a decent web presence. Given this, the PDF download plugin for Firefox is essential, and switching to a much faster and less system intensive reader (I use Foxit) for your default PDF setup is probably a good plan as well.
[1] I'm ignoring text only and other lite browsers such as Lynx here, just talking about normal, standard plays YouTube vids and looks normal browsers.
no subject
Those of you fighting the "can we switch to a better bit of software please" fight may find this useful extra ammo. Those of you just putting up with using IE at work, seriously, start putting pressure on bosses and IT.
Using IE could really mess up your company's bottom line.
no subject
What about all the other flaws?
and what's the vulnerability that affects PDF files?
no subject
Or something.
MS has to say don't switch. Believing them is up to the guy paying the bills.
no subject
no subject
The actual problem is in the IE XML buffer, which Opera apparently uses. If that means stuff to you, great.
no subject
no subject
Firefox can have plugins (I have them, I use them in a secure manner, if anyone ever gets an exploit to automatically trigger them I'll remove them, it's unlikely as they're not common usage). Opera defaults on install (I'm told) to send the user agent as IE, and apparently uses the IE XML memory buffer, which is where the problem was.
I used to recommend Opera to anyone that wasn't using extensions, what's the point of Fx if you don't use the extensions after all, out of the box Opera is better.
But if what I've read is correct, Opera is less secure, thus I'll now recommend Chrome, which at least has brand recognition for people that care about such things or trust names they know.
no subject
The thing is of course that while in this instance Opera trusted Windows not to be vulnerable to buffer overflow attacks when it was, there's nothing to say that Firefox or Chrome or whatever other browser isn't also trusting some other Windows service which is vulnerable.
Unfortunately you sort of _have_ to trust some of the services of the OS you're running on, and while some companies trust very few of them (Opera for instance does a whole load of stuff on its own, which is why it looks slightly odd and I was surprised to see this) they're all going to trust a few. In this instance Opera is vulnerable and other browsers which don't use that service aren't, but that's not indicative of some sort of long-term issue with Opera IMO.
no subject
no subject
no subject
That's slightly misleading. The pretend-to-be is user-adjustable but it's mainly useragent stuff and possibly some box-model interpretation. From what I understand, the vulnerabilities from XML rendering are not due to "default behaviour" in the same sense; I doubt there is another XML rendering option. (I may be wrong, I don't touch desktop Opera).
no subject
no subject
no subject
Oh man, you are so desperately in need of a subscription to US-CERT. Apple had two dozen critical vulnerabilities to OSX *in the last week*.
"Macs don't get viruses" is a slightly bigger myth than "abstinence only education is a good idea".
Just, y'know, FYI. The more people start using Macs, the more likely the crackers are to try and get you, and from what I understand, when they start trying, they'll have a nice easy job...
no subject
Laurens happy protective bubble of Mac security: *is burst*
The more people start using Macs, the more likely the crackers are to try and get you.
I appreciated that when I brought my baby. Obviously now more people are getting them the chances of security breaches will be higher.
no subject
"Mozilla Security Advisories for 3.0," with notes for 3.0.5 that suggest it's addressing the same problems that MS and Opera were having (pesky remote code execution!).
no subject
Mozilla patch holes as soon as they're found, meaning they have vulnerabilities, but those holes are found and fixed ASAP.
(I don't know Opera's system for security releases)
no subject
no subject
Opera is still a brilliant browser btw (fanboy!!)
no subject
Hopefully they'll fix that now.
no subject
Ditto Google Chrome, which also released a patch today. It certainly *could* be coincidence, but until I see something telling me that Firefox hasn't done exactly what Opera did, I'm suspecting that as the most likely explanation.
Relying on the OS for one's core functions isn't exactly unusual.
no subject
no subject
I don't really care what happens at work. Considering how long it took me to show my manager how to make a text box in Excel yesterday, and considering that I won't be there after Christmas, it doesn't seem worth it.
no subject
Discuss.
no subject
Every hole they identify was fixed very quickly and the patch auto updated on default installs.
Apparently that makes it a problem, whereas IEs system of requiring the IT guy to do something makes it more secure.
no subject
no subject
It is slightly weird at times with certain PDF tricks that Adobe allows that aren't technically in the ISO standard, but it's cheap and fast, so we let it off—you can normally see when something looks wrong.
no subject
no subject
But when companies only release their info on PDFs, and have internal (or even external) links that turn out to be PDFs, it's a problem.
When I took over the local party website, the only way to read the manifesto in the local elections was to download a PDF. That isn't going to get any votes at all.
no subject
JSTOR while having masses of lovely references generally presents each page as a JPEG. Which is deeply irritating, as I have to print or load each page individually. What's the bloody point of that?
no subject
This includes supposed "web 2.0 consultancies" and similar. PDFs aren't meant for online reading, they're meant for transmitting documents in a printable format.
Nielsen still puts it as the second biggest mistake in design—that means it's not just a stupid idea, it's a very common stupid idea:
http://www.useit.com/alertbox/9605.html
As for putting text up as JPEGs? I have no clue—it hides the content from search engines and makes copyright infringement harder, but people'll get around that anyway. Why make things hard for legit users?
no subject
Much of JSTOR is behind an academic paywall anyway, so you have access from your institution. Checking a journal at random ("Avian Diseases" as it happens) there's a link to download a PDF too. Which makes the JPEG bit even odder. I suppose it makes online reading easier, but still...
no subject
no subject