Chrome beats the hackers in annual browser bash

Pat Pilcher
Monday 23 March 2009 13:50 GMT
Comments

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

The Pwn2Own competition, which is held every year to challenge hackers and security experts to find vulnerabilities in web browsers and mobile devices, has taken its usual share of victims with one surprise survivor during its first day.

Targeted browsers included Microsoft's Internet Explorer 8, Mozilla's Firefox, and Google's Chrome, running on a Sony Vaio notebook running Windows 7 as well as Safari and Firefox on a Macbook running OS X.

After the first day of the Pwn2Own contest, Google's Chrome browser was the only browser left standing. Firefox, Safari, and Internet Explorer, however, all fell to hackers with Safari exploited in mere seconds.

So what makes Chrome so secure? Previous Pwn2Own champion Charlie Miller says that although he did find a security hole in Google's browser, he was unable to exploit it because of Chrome's browser's sandboxing feature (which is a security mechanism that keeps running code isolated using a tightly-controlled set of virtual resources) and Windows 7 security measures which combined to prevented him from exploiting any Chrome weaknesses.

Competition organisers purchase all winning vulnerabilities that are successfully used against browsers, handing them over to affected vendors, and coordinating full public disclosure to ensure all vulnerabilities are secured.

This article originally appeared in the New Zealand Herald

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in