Opera browser adds phishing filter
New 9.1 version of browser released Monday
IDG News Service - Opera Software ASA has added a filter that blocks phishing sites to its Web browser software, following the example set by rivals Microsoft Corp. and Mozilla Corp.
In Version 9.1 of the Opera Web browser, released Monday, the company introduced a phishing filter that uses information from PhishTank and GeoTrust to help protect users from being duped by phishers.
PhishTank, overseen by open-source group OpenDNS, is a collaborative clearinghouse that allows anyone to submit and track data about phishing sites. GeoTrust provides digital certificates.
Phishing is a form of online fraud in which miscreants use forged Web sites that often look like sites of banks or other trusted financial institutions to trick users into giving up personal information. Filters such as the one in Opera 9.1 alert users when they may be visiting a known phishing site so they can proceed with caution and choose not to provide requested information to that site.
Opera's 9.1 browser is available free.
Microsoft's Internet Explorer 7 and Mozilla's Firefox 2.0 browsers also include filters that block phishing sites. Microsoft released IE7 for Windows XP in October, the same month Mozilla released Firefox 2.0.
IE7 also will be included in the consumer version of Windows Vista due for release on Jan. 30. Microsoft recently patched a flaw in the antiphishing filter in IE7 for XP and plans to patch the same flaw for Vista upon its consumer release.
Opera's Web browser has not been adopted widely by computer users, who still predominantly use IE as their primary browser. However, the Oslo company has had substantial success in distributing its Opera Mini browser on mobile devices through partnerships with device providers around the world.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts