ALL >> Computers >> View Article
Google Patches Bug Exploited By Security Researchers In Pwn2own Contest

Recently, Google patched a security flaw in Chrome browser exploited by security researchers in the Pwn2Own Contest. Security professionals at Google were prompt in releasing the security update for the WebKit flaw, which was exploited by Vincenzo Iozzo, Ralf Philipp Weinmann and Willem Pinckaers. The trio of researchers received a bounty of $15,000 for breaching the security of Blackberry Torch 9800 smartphone by exploiting WebKit flaw. Google also awarded a prize of $1,337 to the team of security researchers under the company’s vulnerability reward program. While Weinmann is a post-doctoral researcher from Luxembourg, lozzo works as an engineer in Germany and Pinckaers is a security consultant from the Netherlands.
Attackers may exploit the vulnerability resulted by an error in style handling to cause memory corruption. WebKit is the rendering engine used by Chrome browser. The company has rated the patched vulnerability as high in severity. Google rates vulnerabilities as critical, high, medium and low in terms of severity. High rating is given to a flaw that allows attackers to read confidential data or execute ...
... arbitrary code or interfere with browser security features, and those which arise during the implementation of sandbox.
The company has updated the stable and beta channels of the Chrome browser to 10.0.648.133 for Windows, Mac, Linux and Chrome by mitigating the WebKit security flaw. The company does not reveal additional information regarding security flaws for a long period to enable users to update the patch. Attackers try to take advantage of the lack of security awareness among people to exploit vulnerabilities. Online IT courses and video tutorials may be used to create cyber security awareness among users.
Attackers are quick to identify and exploit vulnerabilities. The vulnerability reward programs by software developers are aimed at encouraging researchers to detect flaws before their exploitation by malicious individuals. Growing threats in the online environment have resulted in increased demand for professionals qualified in IT degree programs and security certifications.
Except for the identified security flaw, Google Chrome remained unbreached at the Pwn2Own contest. Firefox, the other popular web browser also survived the contest and was not intruded by security researchers. Security professionals are required to constantly update their skills to deal with vibrant security threats. Online IT degree, e-learning programs, webinars and seminars may help security professionals in enhancing their technical know-how and improving skill sets.
Add Comment
Computers Articles
1. Looking For A Tableau Replacement? Try Helical Insight – Open Source Bi ToolAuthor: Vhelical
2. Accidentally Deleted Files From Your Hard Drive? Here’s What To Do Next
Author: f2.technology
3. Optimizing Manufacturing With Intelligent Online Production Planning
Author: Logitrac360
4. Extract Food App Review Data For Customer Sentiment
Author: Food Data Scrape
5. How Can Korean Naver Window Scraping Help You Analyze Korean Product Trends?
Author: Mobile App Scraping
6. Web Scraping Organic Vs Paid Listings On Food Apps
Author: Food Data Scrape
7. The Real Cost Of Ignoring Paid Marketing
Author: Nodesure Technologies Pvt Ltd
8. The Ultimate Guide To Height Safety Training In Melbourne
Author: Train Now
9. Why Helical Insight Is The Leading Open Source Business Analytics Tool
Author: Vhelical
10. Reliable Humidity Monitor And Refrigerator Alerting Solutions From Tempgenius For Critical Environments
Author: Chris Miller
11. Discover The Best Lenovo Store And Dell Showroom In Mumbai For Quality Tech
Author: Prachi Grey
12. Revolutionizing Data Reports The Rise Of Open Source Chat-based Reporting Tools
Author: Vhelical
13. Ultimate Guide To Doctor App Development
Author: EMed
14. How To Ensure Accurate Naver Blog Data Scraping On Android And Ios Devices?
Author: Mobile App Scraping
15. Powering Connectivity: Modern Networking Solutions
Author: Trinity Diaz