Security shortcomings mean that multiple password managers could be tricked into auto-filling credentials on untrusted pages, security researchers at Google warn. The team from Google went public with...
Tesla is one of several organizations to remedy cross-origin resource sharing (CORS) misconfigurations after security researchers proved they could exfiltrate data from the carmaker’s internal network. That’s according...
Windows servers running Microsoft Office Online Server can be exploited to achieve server-side request forgery (SSRF) and thereafter remote code execution (RCE) on the host, according...
Certificate authority Let’s Encrypt has announced plans to establish a platform that will support the revocation of digital certificates via Certificate Revocation Lists (CRLs). The CRL...
Germany is mandating the use of secure, modern web browsers across government networks with a proposal for minimum standards currently open to consultation. The Federal Office...
Microsoft has introduced an optional feature to its Edge browser that applies more stringent security controls when users visit unfamiliar websites. Enhanced security mode mitigates memory-related vulnerabilities by...
A cross-site scripting (XSS) vulnerability in AMP for Email, Gmail’s dynamic email feature, has netted a security researcher a $5,000 bug bounty payout. AMP for Email brings AMP...
A bug in the Chromium project allowed attackers to bypass site isolation protection through iFrames and popup windows to carry out a host of malicious activities....
A new release of Tor Browser enables users to circumvent location-specific censorship to connect to the anonymous web browser more easily. Introduced in version 11.5, Connection...
INTERVIEW Jon von Tetzchner has launched not one, but two web browser companies in his career. Today, he is CEO of Vivaldi Technologies, the business behind the Vivaldi browser, which...
Recent Comments