Firefox 1.5.0.5 out and be cautious with extensions…



Well, let’s start with the extensions first. Like ANY software, you should be cautious installing something from an untrusted source. If you think an extension looks neat and cool – look for reviews and third party information before installing it. That much said…. never install an extension that comes attached as an unexpected email…. Apparently, just that has been happening a password stealing trojan has been showing up as an email attachment that appears to be a firefox extension. OK – quick review – what’s the weakest link in computer security (grab mirror and look….) Now… Mozilla has also released some security updates for Firefox….


The security fix has a story on the update here. It should be noted that there are NO updates for the 1.0.x series…. please upgrade to 1.5.0.5 to get the latest security updates. This fix includes patches for about a dozen security vulnerabilities. I’ve seen comments reporting some stability problems with online videos although I can’t confirm (seem to be windows based). I would tend to think about the security update first and deal with online video problems later.

Sans has information on the Mozilla updates (Firefox THUNDERBIRD and seamonkey. They also have details (links) to information on the vulnerabilities addressed, so if you want the details – that’s a good place to look.

Related Posts

Blog Traffic Exchange Related Posts
  • How Microsoft could patch VML vulnerability before October's patch day SO, there's the second big vulnerability exploit for Internet Explorer making the rounds in about a week and Microsoft's advisory says that the most recent flaw will likely be patched on October's patch day ("unless the need arises...") So, what would trigger that need? Lot's of browsers being subjected to......
  • How to Remove AntiTroy | AntiTroy Removal Guide AntiTroy is a rogue antivirus application that is usually installed through trojans that are masquerading as a video codec update or flash player update. It usually installs without the computer users permission and will complain about many security issues with your pc. It will claim that there are virus infected......
  • Network Security guide for the home or small business network - Part 5 - Update your software Okay - so after the last article you've inventoried what software you use on a PC and you know what services (server's) the pc runs that you've told it to. You even know what passes as "normal" startup programs. Now it's time to put that to use. It's time to......
Blog Traffic Exchange Related Websites
  • Make Free Phone Calls Anywhere in the USA with Google Voice, Gizmo, and Asterisk Update: The instructions here are no longer valid, because Google has since closed off inbound SIP calls into Google Voice. However, I have posted a new solution for making free phone calls with Google Voice, Gizmo, and Asterisk. I recently switched my GrandCentral account over to Google Voice. I fooled......
  • Another 7 Steps for How to Get Traffic to Your Blog If you are trying to learn how to get traffic to your blog, then you will benefit from the tips in this series, which are designed to show you the necessary steps for how to get traffic to your blog. When you have the right tips, tricks and resources in......
  • Computer Malware and Preventive Recommendations: Botnets It’s often what we don’t know can hurt us the most… That is the case when it comes to the effects of malware such as computer viruses, worms and Trojans. Botnets are one of the fastest growing and the most dangerous threat on the Internet today. “Bot” stands for robot,......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site