Browser Vulnerabilities

All browsers are vulnerable, and must be updated and patched — Googles Chrome, older versions of Apple’s iOs, and some versions of Android.

Chrome happens to be the most widely used browser — almost 65 per cent internet users use it. It covers two thirds of net banking, trading and financial activities.

Edge of MS has been used as a default browser by a few. Android has the highest share in mobile market, and Apple’s iOS stands next to it, say 27-28 per cent. Safari commands a share of 19 per cent.

Google has released security fixes for Chrome. Some apps are directly loaded from a website, without downloading. Chrome fails to validate security on such apps. It is called Exploit in the Wild. Some hacker somewhere finds this vulnerability and exploits it.

There is cunning misuse of memory called use after free. Programming allocates portions of dynamic memory — RAM — for their own use. On such portions, they store data or code . However, when such portion is not needed, the memory there gets freed. In a use after free bug, the programme is led to believe that it is still using free portion of memory. A cunning hacker sneaks in a malicious code or fraudulent data in that address. It misleads the programme. A banking software can be led to transfer cash to abc account by exploiting the use after free bugs.

Apple’s vulnerabilities occur in iOS, MacOS and iPad. These are vulnerable to remote code execution.

The users must continuously update, and plug the gaps. Updating makes you safer, but complete safety is a chimera on internet. Researchers spot the vulnerabilities. Ethical hackers are encouraged to report these, and rewarded for it. However, the benefits of hacking far outweigh the benefits of rewards.

print

Leave a Reply

Your email address will not be published. Required fields are marked *