Chrome last browser standing after day one of Pwn2Own

       

Google’s Chrome browser is the last web browser standing after day 1 of Pwn2Own. Does this make you reassess your daily browser?

A recent contest at CanSecWest, an event that brings together some of the most skilled experts in the security community, has demonstrated that the three most popular browser are susceptible to security bugs despite the vigilance and engineering prowess of their creators. Firefox, Safari, and Internet Explorer were all exploited during the Pwn2Own competition that took place at the conference. Google’s Chrome browser, however, was the only one left standing—a victory that security researchers attribute to its innovative sandbox feature.

I have to admit that while Chrome isn’t my default browser, I’m  quite fond of it. Its ability to handle countless tabs and Windows being open (as long as you have enough RAM) is far superior to any of the other big browsers. It’s also very stable and I’ve never had a crash that’s managed to take out all the tabs or make the wheels fall off the OS. The fact that Chrome’s survived day 1 of Pwn2Own makes me think that Google could set the security benchmark in much the same way that it is currently the speed pace setter.

Sure, Chrome doesn’t have all the bells and whistles that other browser have (and no add on support like Firefox) but it’s a fast, robust, and i seems secure bit of code.

Chrome is a browser worth keeping an eye on.

by Adrian Kingsley-Hughes

Related Post 

Advertisements

One Response

  1. […] Related Post Chrome last browser standing after day one of Pwn2Own […]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: