Hi, guest ! welcome to ZOOMTUTORIALS.com. | About Us | Contact | Register | Sign In

Google Chrome Most Hold Hacker Attacks

Chrome browser to be the most resistant of hacker attacks this year. At least that is the result Pwn2Own, a competition that tests network security experts to be able to penetrate the security system, in the CanSecWest Security Conference in Vancouver, Canada.

In the competition this year, Charlie Miller who was also winner of the race months ago successfully break the security system is only in Safari within 10 seconds only. Recognized by the security analyst at Independent Security Evaluators, the fact that he has found in the rift system since Safari years ago.

Albeit through a fairly difficult process, the attacker can only attack the security wait time with the computer users to click a link to the url evil. In the competition that also, IE8 and Safari security system can be penetrated. Firefox and IE8 also penetrating within 12 hours.

While for Chrome, the participants are actually able to find a bug in the system security. However, the bug can not be exploited further because the browser has a feature Sandbox. Plus there is also cooperation with the operating system to provide the best protection.

Chrome is quite surprising victory for the new browser was launched in the last half year ago. Google Chrome's portfolio also increased after major energy so as recorded at most software downloaded in 24 hours and immediately grab the market share of 1 percent.

Pwn2Own this year, the competition is divided into two-class technology, the web browser and mobile phone. Competition is sponsored by TippingPoint, a network security company. Web browser, which in the competition this year is the Internet Explorer 8, Firefox, Chrome, and Safari. While competition for mobile phone is the Blackberry, Android, iPhone, Nokia / Symbian, and Windows Mobile.

Rewards offered arouse enough, that is 5000 U.S. dollars per bug in the web browser, and 10,000 U.S. dollars per bug on the mobile phone. Participants can also bring home a laptop that is used to penetrate the security system for free, that is, the Sony Vaio or Macbook as long as the participant became the first person who can show you the bug.

Participants were also required to sign the agreement, stating that they can not distribute a bug that they find. With this race, it is expected that the web developers are able to know what bugs me is in my web browser and they immediately add that there is rift.
Share this article now on :