Firefox/Planning/2012-12-12: Difference between revisions

Line 109: Line 109:
* However, a vulnerability in all versions of Internet Explorer allows users' mouse cursors to be [http://spider.io/blog/2012/12/internet-explorer-data-leakage/ tracked anywhere on the screen, even if the window is minimized]. Microsoft was notified on October 1 but no action has yet been taken to rectify the issue. The reporter notes that "The vulnerability is already being exploited by at least two display ad analytics companies across billions of page impressions per month."
* However, a vulnerability in all versions of Internet Explorer allows users' mouse cursors to be [http://spider.io/blog/2012/12/internet-explorer-data-leakage/ tracked anywhere on the screen, even if the window is minimized]. Microsoft was notified on October 1 but no action has yet been taken to rectify the issue. The reporter notes that "The vulnerability is already being exploited by at least two display ad analytics companies across billions of page impressions per month."
==== Maxthon ====
==== Maxthon ====
* Maxthon this week released the [http://www.maxthon.com/ "first cloud browser that connects all of your devices". Working across PCs and iOS and Android mobile devices, the cloud-based services [http://www.youtube.com/watch?feature=player_embedded&v=hmLdb2aQ9IA allow users to send links, images, and other content easily between different devices].
* Maxthon this week released the [http://www.maxthon.com/ "first cloud browser that connects all of your devices".] Working across PCs and iOS and Android mobile devices, the cloud-based services [http://www.youtube.com/watch?feature=player_embedded&v=hmLdb2aQ9IA allow users to send links, images, and other content easily between different devices].
 
==== Security ====
==== Security ====
* Some Australian researchers have [http://www.gizmodo.com.au/2012/12/amazons-silk-browser-can-be-hacked-to-provide-free-grid-computing/  published a paper] documenting how they took advantage of Amazon's Silk browser to perform data analysis tasks. They warned that it would simple to use the same techniques to conduct denial-of-service attacks or crack passwords.
* Some Australian researchers have [http://www.gizmodo.com.au/2012/12/amazons-silk-browser-can-be-hacked-to-provide-free-grid-computing/  published a paper] documenting how they took advantage of Amazon's Silk browser to perform data analysis tasks. They warned that it would simple to use the same techniques to conduct denial-of-service attacks or crack passwords.
Confirmed users
270

edits