Researchers Break Into Firefox, Internet Explorer At Pwn2Own

March 13, 2014
37
Views

managed to net a cool $300,000. Impressively, most of the contestants managed to demonstrate their skills within 5 minutes — despite the fact that they had a full 30 minute time frame to do it. Once the exploits were demonstrated, they retired to the disclosure room to present the details to the software vendors. This, obviously, is one of the main conditions of this competition. The first day of Pwn2Own 2014 got even more epic, after a few of the researchers even donated their wins to charity organizations across the globe, including the Canadian Red Cross. Along with Internet Explorer 11 on Windows 8.1, Firefox and Safari, security vulnerabilities were also found in Adobe Flash and Reader. What remains to be seen is whether anyone can break into Chrome in what will be the second (and last) day of the competition, tomorrow. Plus, we can now expect all these security holes fixed in future patches for these software.]]>

Article Categories:
Miscellaneous

Mike Johnson is a writer for The Redmond Cloud - the most comprehensive source of news and information about Microsoft Azure and the Microsoft Cloud. He enjoys writing about Azure Security, IOT and the Blockchain.

All Comments

  • As of today, Chrome looks like a winner, but that could change tomorrow according to the article!

    Emily Williams March 13, 2014 2:59 pm Reply
  • David, how do hackers make $300,000 by hacking into these browsers? Did they steal things or was it just the competition and they proved their hacking ability to earn it.

    Ted Smith March 13, 2014 3:24 pm Reply
  • Well, this didnt make me feel any safer about the web, but thanks for posting nonetheless! It looks like we need to be extra careful if hacking is this easy.

    Jake Phillips March 13, 2014 5:06 pm Reply
  • Is this only on windows 8.1, or is it on other windows OS and Apple OS as well?

    Wayne Scott March 13, 2014 5:24 pm Reply

Leave a Reply

Your email address will not be published. Required fields are marked *