Articles tagged with: Chrome
Uncategorized »

Google once again sponsoring reward for the Chrome exploit discovered by anyone on the CanSecWest security conference. THis is to make sure Chrome browser is security bug free and free from exploit.
$60,000 – “Full Chrome exploit”: Chrome / Win7 local OS user account persistence using only bugs in Chrome itself.
$40,000 – “Partial Chrome exploit”: Chrome / Win7 local OS user account …
Uncategorized »
Mac users will get their first taste of a Google-developed alternative to incumbent browsers such as Safari and Firefox when the search giant releases Chrome for Mac sometime during the “first half” of this year.
More: continued here
Uncategorized »
Some technologies move fast, while others blaze at lightning speed such as Google’s latest Chrome browser, now at version 2.0.156.1.The latest release includes a major new version of the WebKit rendering engine, security and speed enhancements as well as a new HTTP (define) engine that could herald the introduction of Chrome for Linux and Mac.
More: continued here
Uncategorized »
Installing and running Firefox 3.1 beta 1 is a revealing experience. Just like Chrome reminded us a few weeks ago, the basics of a browser matter. We have been using Firefox 3.1 beta 1 for a day now and we have come to two conclusions: We refuse to go back to a previous version and Microsoft’s Internet Explorer is …
Uncategorized »
oogle launched its first foray into the browser wars today with the official release of Chrome, a new open source web browser that aims to push forward Internet innovation and elevate user expectations. Although Chrome is still a bit light on features, it is surprisingly polished and has an assortment of highly promising capabilities.
read more | digg story
Uncategorized »
Google Chrome has quickly become one of our favorite browsers here at RWW, but, as Ryan Narraine, a security evangelist at Kaspersky Lab, reports, Chrome has also inherited a potentially serious security flaw from the old version of WebKit it is based on. An attacker could easily trick users into launching an executable Java file by combining a…
read more | …