Feeds

Apple plugs holes in new Safari beta

Windows browser not 'secure from day one'

Beginner's guide to SSL certificates

Three days after unleashing a bug-infested beta version of its Safari browser on Windows users, Apple has released an update plugging three serious holes that could allow miscreants to commandeer a user's machine.

The fixes are available by downloading Safari 3.0.1 Public Beta for Windows or by using the "Apple Software Update" application, which is installed with the most recent Windows version of QuickTime or iTunes. Mac users are unaffected by the vulnerabilities and need not take action.

The ink wasn't even dry on Tuesday's press release announcing the Windows beta when at least three separate researchers said they found gaping holes in Safari, which Apple likes to say was designed "to be secure from day one."

Among the flaws was one discovered by security researcher Thor Larholm that could allow a specially-crafted website to execute malicious code on a Windows machine running Safari. Aviv Raff and David Maynor also pokes holes in the rookie browser.

We are genuinely impressed with the swiftness of this update. Yes, it indicates Apple is serious about being an important browser contender for Windows users. But it also shows that the company is bringing the requisite urgency to providing users with products that are secure.

That said, we wouldn't be at all surprised if other security flaws are discovered in Safari for Windows over the coming weeks or months. Windows users who aren't researchers or software developers may want to think twice about using Safari while it's still in beta. ®

Remote control for virtualized desktops

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.