Despite Hack, IE 8 Most Protected Browser

Despite the survival of Google Chrome and the fall of Internet Explorer 8 (running on Windows 7), all the browser hackers at the contest maintained that Microsoft’s browser is by far the most difficult to exploit.  For starters, IE 8 is the only browser to fully — and properly — implement ASLR (see explanation from Nils).

Despite the survival of Google Chrome and the fall of Internet Explorer 8 (running on Windows 7), all the browser hackers at the contest maintained that Microsoft’s browser is by far the most difficult to exploit.  For starters, IE 8 is the only browser to fully — and properly — implement ASLR (see explanation from Nils).  Peter Vreugdenhil, the researcher behind the successful IE 8 hack, needed two different vulnerabilities and several exploitation tricks (see paper – pdf) to get it to work.   However, because IE is the world’s most widely deployed browser, it will continue to attract the attention of hackers and malware writers.   Security doesn’t equate to safety.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.