Feeds

Apple plugs holes in new Safari beta

Windows browser not 'secure from day one'

The Power of One eBook: Top reasons to choose HP BladeSystem

Three days after unleashing a bug-infested beta version of its Safari browser on Windows users, Apple has released an update plugging three serious holes that could allow miscreants to commandeer a user's machine.

The fixes are available by downloading Safari 3.0.1 Public Beta for Windows or by using the "Apple Software Update" application, which is installed with the most recent Windows version of QuickTime or iTunes. Mac users are unaffected by the vulnerabilities and need not take action.

The ink wasn't even dry on Tuesday's press release announcing the Windows beta when at least three separate researchers said they found gaping holes in Safari, which Apple likes to say was designed "to be secure from day one."

Among the flaws was one discovered by security researcher Thor Larholm that could allow a specially-crafted website to execute malicious code on a Windows machine running Safari. Aviv Raff and David Maynor also pokes holes in the rookie browser.

We are genuinely impressed with the swiftness of this update. Yes, it indicates Apple is serious about being an important browser contender for Windows users. But it also shows that the company is bringing the requisite urgency to providing users with products that are secure.

That said, we wouldn't be at all surprised if other security flaws are discovered in Safari for Windows over the coming weeks or months. Windows users who aren't researchers or software developers may want to think twice about using Safari while it's still in beta. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.