Posted on June 27, 2011 by infogrip-tech
Just three months after the release Firefox 4, Mozilla has released Firefox 5 for the desktop and Android devices.
That’s a big change from the two years it took to move from Firefox 3.5 to Firefox 4. Firefox 5 is part of Mozilla’s new rapid release development cycle. Which is more like what Google does with its Chromer browser and promises faster updates. Mozilla wants Firefox to hit version 7 by the end of the year.
Visually, Firefox 5 looks identical to Firefox 4. Rather than reinventing the wheel, Mozilla has added better support for web standards, fixed some bugs, made performance enhancements and added a few additional code touches.
The big new features, courtesy of the release notes is:
Firefox 5 is fast — even faster than Firefox 4. It’s nice to see the more frequent update cycle, because it means that the browser will be more able to support the latest and greatest browser features.
To update to the latest Firefox, click on the “check for updates” button in the “About Firefox” menu.
Posted on August 05, 2010 by infogrip-computer-support
The Firefox updated page that automatically pops up after an update has never lead us wrong before but some enterprising malware writers have crafted a fake clone of the update page with a catch – it urges the user to download a flash update. What the victim gets is a fake an…ti-virus program that immediately starts spouting warnings and demanding money. PC Mag reports that the attack is rogue and was discovered by F-Secure. (more…)
Posted on August 04, 2010 by infogrip-computer-support
All the common browsers are subject to exploits that use the auto-complete feature to force them to give up personal data, as presented at Black Hat security conference last week. Computer World reports that the presentation “Breaking browsers: Hacking Auto-Complete” is by Jeremiah Grossman, the CTO of WhiteHat Security. None of the techniques used were that difficult and the data that can be gathered from auto-complete includes names, addresses, e-mail addresses, and sometimes passwords, credit card numbers, and search entries. That data can be used to break into bank or email accounts, or to set the victim up for more malware that can get more data out of them. (more…)