The Opera browser is a popular alternative to Internet Explorer, Google Chrome, and Safari. Its clean look and unique features make it an appealing alternative to users unhappy with their current browser or anyone looking to try something new. However, as with most software products, Opera does have its drawbacks.
The Google Chrome and Opera browsers present an interesting case study of another example of how to exploit vulnerabilities, in both instances through the respective browser’s embedded Rich Site Summary (RSS) reader. These vulnerabilities are exploited by a user who clicks a RSS feed link from an email or in
It is extremely important to keep your software updated, particularly your web browser. By way of example, consider older versions of the Safari Browser. One of the features of Safari is the “Top Sites” function, which stores a user’s favorite and most visited web sites. Prior to version 4.0.3 though,
One of the Opera Internet browser’s older functions, which has now been phased out, was Opera Unite. Opera Unite allowed a browser to act as both a client and a server, allowing a user to receive web content and present web content, using the same browser. Although this feature was
Cross-site scripting, or XSS, is a well-known cyber security risk that allows malicious users to take control of, and exploit, a user’s system. Another security risk is Cross-Site Request Forgery (CSRF, or “sea surf”). This risk allows someone to execute functions within a user’s authenticated session, thus the “forgery” portion
As our other posts have shown, keeping your software up-to-date is vital, especially with respect to security. Software updates often have some type of security component to patch a known vulnerability. By way of example, consider a cross-site scripting (XSS) vulnerability from previous versions of several popular web browsers. This