{"id":7708,"date":"2009-04-27T17:36:10","date_gmt":"2009-04-27T15:36:10","guid":{"rendered":"http:\/\/tokao.com\/?p=1161"},"modified":"2009-04-27T17:36:10","modified_gmt":"2009-04-27T15:36:10","slug":"google-chrome","status":"publish","type":"post","link":"https:\/\/tokao.com\/wordpress\/2009\/04\/27\/google-chrome\/","title":{"rendered":"Time to patch Google Chrome"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1162\" title=\"google_chrome\" src=\"https:\/\/cloud.norai.net\/wordpress\/wp-content\/uploads\/2009\/04\/google_chrome-1.jpg\" alt=\"google_chrome\" width=\"96\" height=\"92\" \/>Earlier this month, a\u00a0<a href=\"http:\/\/code.google.com\/p\/chromium\/issues\/detail?id=9860\">problem<\/a>\u00a0was discovered in Google&#8217;s new web browser,\u00a0<a href=\"http:\/\/www.google.com\/chrome\">Google Chrome<\/a>, that would have allowed an attacker to launch and run scripts on a compromised machine. The issue, originally discovered by Roi Saltzman of the IBM Rational Application Security Research Group, had been given a security rating of &#8220;high.&#8221; Interestingly enough, although the attack takes advantage of security issues in Google Chrome, the initial entry point for the malicious code would have taken place in Internet Explorer.<\/p>\n<p>Goolge has\u00a0<a href=\"http:\/\/googlechromereleases.blogspot.com\/2009\/04\/stable-update-security-fix.html\">now released a patch<\/a>\u00a0for this issue. If you want to make sure your browser is up-to-date, click through for the instructions.<\/p>\n<h5><span style=\"font-weight: normal;\">(article from readwriteweb)<\/span><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this month, a\u00a0problem\u00a0was discovered in Google&#8217;s new web browser,\u00a0Google Chrome, that would have allowed an attacker to launch and run scripts on a compromised machine. The issue, originally discovered by Roi Saltzman of the IBM Rational Application Security Research Group, had been given a security rating of &#8220;high.&#8221; Interestingly enough, although the attack takes [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[9],"class_list":["post-7708","post","type-post","status-publish","format-standard","hentry","category-technology","tag-google"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/tokao.com\/wordpress\/wp-json\/wp\/v2\/posts\/7708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tokao.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tokao.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tokao.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tokao.com\/wordpress\/wp-json\/wp\/v2\/comments?post=7708"}],"version-history":[{"count":0,"href":"https:\/\/tokao.com\/wordpress\/wp-json\/wp\/v2\/posts\/7708\/revisions"}],"wp:attachment":[{"href":"https:\/\/tokao.com\/wordpress\/wp-json\/wp\/v2\/media?parent=7708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tokao.com\/wordpress\/wp-json\/wp\/v2\/categories?post=7708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tokao.com\/wordpress\/wp-json\/wp\/v2\/tags?post=7708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}