Google Chrome ranks No.1 in the number of browser vulnerabilities
- Seagate 12TB HDD: 7.46% failure rate and 1.5 year lifespan
- An American company made 0.7nm chips: EUV lithography machines can’t do it
- 14000 cores + 450W: RTX 4080 graphics card perfectly replaces the RTX 3080
- Big upgrade: The difference between Bluetooth 5.0 and 5.2
- Geeks Disappointed that RTX 4080/4090 doesn’t come with PCIe 5.0
- What are advantages and disadvantages of different load balancing?
Google Chrome ranks No.1 in the number of browser vulnerabilities.
Mining cryptocurrency by exploiting information security vulnerabilities in browsers is one of the channels for hackers to launch malicious attacks.
According to the latest research report released by the network service platform Atlas VPN, the Chrome browser, which has more than 3.3 billion users, ranks first among the world’s most popular browsers with a market share of over 60%.
However, by far, the number of vulnerabilities found in Chrome is also the largest.
From January to October 5 this year, statistics based on the VulDB vulnerability database show that Chrome has accumulated 303 vulnerabilities, ranking first in the number of browser vulnerabilities. Next is Mozilla Firefox, with 117 vulnerabilities. The third is Microsoft Edge with 103 vulnerabilities.
The fourth and fifth places are Apple Safari with 26 vulnerabilities and Opera with zero vulnerabilities.
If the time is further extended, since its release, the cumulative number of vulnerabilities discovered in Chrome, which came out in September 2008, has reached as high as 3,159.
Mozilla Firefox has reached 2,361 since 2004, and Safari has reached 1,139 since 2003.
Edge, which Microsoft launched in 2020, has a total of 806 vulnerabilities.
As for the old Opera, the number of vulnerabilities is the least, with 344 since 1995.
In response to the warning messages of existing security vulnerabilities from the browser from time to time, in order to avoid malicious attacks by hackers who take the opportunity to exploit the vulnerabilities, Atlas VPN also proposes three suggestions for browser users.
The first is to ensure that the version of the browser you are using is always up to date with the latest update.
Second, if there is a need to install browser plug-in extensions, be careful not to download from unknown sources.
The third is when you receive emails from unknown senders, you must be vigilant and discreet, and don’t click on attachment URLs or files easily to avoid falling into the trap of phishing emails.
From January to October 5, 2022, Chrome ranks first in the number of browsers found to have vulnerabilities.
Over the years to date, the cumulative number of vulnerabilities found in browsers.
- DIY a PBX (Phone System) on Raspberry Pi
- How to host multiple websites on Raspberry Pi 3/4?
- A Free Intercom/Paging system with Raspberry pi and old Android phones
- DIY project: How to use Raspberry Pi to build DNS server?
- Raspberry Pi project : How to use Raspberry Pi to build git server?