{"id":17462,"date":"2018-04-16T08:00:36","date_gmt":"2018-04-16T12:00:36","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=17462"},"modified":"2022-04-27T16:14:25","modified_gmt":"2022-04-27T20:14:25","slug":"patch-your-firefox-browser-before-its-too-late","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/patch-your-firefox-browser-before-its-too-late\/","title":{"rendered":"Patch Your Firefox Browser Before It&#8217;s Too Late"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Are you a devoted Mozilla Firefox user? Then you need to know about <\/span><a href=\"https:\/\/thehackernews.com\/2018\/01\/firefox-browser-update.html\"><span style=\"font-weight: 400;\">the browser\u2019s latest update<\/span><\/a><span style=\"font-weight: 400;\"> as it helps address a security vulnerability that\u2019s been plaguing Firefox for a while. Software developers released this update as a patch for a flaw that could give hackers the ability to execute malicious code on computers running an older version of the browser.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s what you should know about the dangers of this vulnerability and why it\u2019s important to patch your browser right now.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/how-vulnerable-is-email-account-to-malware\/\"><b>How Vulnerable Is Your Email Account to Malware?<\/b><\/a><\/p>\n<p><b>An \u2018Arbitrary Code Execution\u2019 Flaw<br \/>\n<\/b><span style=\"font-weight: 400;\">Mozilla released the Firefox update a week after the release of the company\u2019s new Firefox Quantum browser, also known as Firefox 58. The new browser includes an improved graphics engine, as well as performance optimizations and patches for more than 30 browser vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cisco released a security advisory that stated this update for Firefox 58.0.1 fixes an \u2018arbitrary code execution\u2019 vulnerability.<\/span><\/p>\n<p><b>Could Hackers Get to You?<br \/>\n<\/b><span style=\"font-weight: 400;\">The vulnerability opens the doors for hackers to run arbitrary code on a victim\u2019s computer that tricks them into opening a file with malware containing malicious code. Cybercriminals could then take control of a user\u2019s privileges and completely compromise their system. They could do everything from installing programs to creating new accounts, to changing or deleting data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If a user\u2019s configurations offer fewer user rights, the impact on their device could be less harmful. Owners of Firefox 56 (.0, .0.1, .0.2), 57 (.0, .0.1, .0.2, .0.3, .0.4) and 58 (.0) could be affected. You can download the update on <\/span><a href=\"https:\/\/www.mozilla.org\/en-US\/firefox\/58.0.1\/releasenotes\/\"><span style=\"font-weight: 400;\">the company\u2019s website<\/span><\/a><span style=\"font-weight: 400;\">. The vulnerability was discovered by Mozilla developer Johann Hofmann and it does not affect Firefox browser for Android and Firefox 52 ESR.<\/span><\/p>\n<p><b>How Can Chrome Users Protect Themselves?<br \/>\n<\/b><span style=\"font-weight: 400;\">If you don\u2019t use Firefox, this update doesn\u2019t apply to you, but Chrome users may have to deal with other vulnerabilities. Google recently released a new update for Chrome in version 64, which includes changes to the browser that should help deal with speculative side-channel browser attacks. These are malicious ways in which hackers try to gain access to a system\u2019s memory.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The biggest lesson here? Always update your browser because important security patches within updates keep your online experiences safer than not.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s a Mozilla Firefox \u2018arbitrary code execution\u2019 flaw that leaves your browser vulnerable. Here\u2019s how to fix it.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[259,53,249,243],"class_list":["post-17462","post","type-post","status-publish","format-standard","hentry","category-security","tag-hackers","tag-internet","tag-security","tag-technology"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=17462"}],"version-history":[{"count":4,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17462\/revisions"}],"predecessor-version":[{"id":17901,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17462\/revisions\/17901"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=17462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=17462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=17462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}