Tag: browser

Mar 26

And the prize for LEAST SECURE BROWSER goes to … Chrome! • The Register

And the prize for LEAST SECURE BROWSER goes to … Chrome! • The Register.

Mar 24

DNS leak test

What is a DNS leak and why should I care?

When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network. If any traffic leaks outside of the secure connection to the network, any adversary monitoring your traffic will be able to log your activity.

DNS or the domain name system is used to translate domain names such as www.privacyinternational.org into numerical IP addresses e.g. 123.123.123.123 which are required to route packets of data on the Internet. Whenever your computer needs to contact a server on the Internet, such as when you enter a URL into your browser, your computer contacts a DNS server and requests the IP address. Most Internet service providers assign their customers a DNS server which they control and use for logging and recording your Internet activities.

Under certain conditions, even when connected to the anonymity network, the operating system will continue to use its default DNS servers instead of the anonymous DNS servers assigned to your computer by the anonymity network. DNS leaks are a major privacy threat since the anonymity network may be providing a false sense of security while private data is leaking.

via DNS leak test.

Feb 22

Lenovo Computers Vulnerable to HTTPS Spoofing | US-CERT

Lenovo consumer personal computers employing the pre-installed Superfish Visual Discovery software contain a critical vulnerability through a compromised root CA certificate. Exploitation of this vulnerability could allow a remote attacker to read all encrypted web browser traffic (HTTPS), successfully impersonate (spoof) any website, or perform other attacks on the affected system.

US-CERT recommends users and administrators review Vulnerability Note VU#529496 and US-CERT Alert TA15-051A for additional information and mitigation details.

via Lenovo Computers Vulnerable to HTTPS Spoofing | US-CERT.

Jan 21

RadicalResearch HSTS Super Cookies

Websites could use a security feature of your iPad to track your browsing even if you clear the browser history.

via RadicalResearch HSTS Super Cookies.

Jan 13

RaiderSec: How Browsers Store Your Passwords (and Why You Shouldn’t Let Them)

RaiderSec: How Browsers Store Your Passwords (and Why You Shouldn't Let Them).

Aug 19

Mozilla forwards your download history to Google

P.S.: you can disable this by typing “about:config” as an url then change the “browser.safebrowsing.enabled” parameter.

Mozilla Improves Malware Blocking in Firefox 31 | Threatpost | The first stop for security news.

Mar 09

How to modify your browser’s fingerprint so that it is no longer unique | gHacks Technology News

FireGlov

via How to modify your browser’s fingerprint so that it is no longer unique | gHacks Technology News.