Feeds

Browser developers team up to thwart hackers

Security summit

Top 5 reasons to deploy VMware with Tegile

Security developers representing four of the major browser firms have met up to discuss how to combat security threats. Techies working on Internet Explorer, Mozilla/FireFox and Opera teamed up with the folks from Konqueror to discuss how to combat security risks posed by phishing, aging encryption ciphers and inconsistent SSL Certificate practices. A surprising amount of consensus emerged through the informal meeting, hosted by Konqueror's George Staikos in Toronto last week.

All agreed to push ahead with plans to introduce stronger encryption protocols. "With the availability of bot nets and massively distributed computing, current encryption standards are showing their age," Staikos writes. "Prompted by Opera, we are moving towards the removal of SSLv2 from our browsers. IE will disable SSLv2 in version 7 and it has been completely removed in the KDE 4 source tree already."

Colour coding the address bar on browsers, to indicate whether the digital certificate of a site has been validated, and Microsoft's development of an anti-phishing plug-in for its upcoming IE7 browser also got an informal thumbs up. Altogether the meeting showed techies on competing teams have come a long way since the browser wars of the late 1990s and are now focused on fighting a common enemy, virus peddlers and criminal hackers. "I'm very optimistic about the future of co-operation among browser developers and I hope this recent work signals a new trend of good relations," Staikos concludes.

A fuller account of the meeting can be found on a KDE development blog here. ®

Beginner's guide to SSL certificates

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.