Google shuts off antiphishing feature in Firefox 2.0
Mozilla again urges users to upgrade to the newer Firefox 3.0
Although the two most-recent builds of Firefox 2.0, labeled 220.127.116.11 and 18.104.22.168, have omitted the defense, earlier editions of the browser were still able to query Google for a list of sites suspected of hosting identity theft scams. But Google is now shutting down the blacklist, said Mike Beltzner, director of Firefox.
"If you're using a previous version of Firefox 2, even though the feature is enabled in your browser, as of January 20 no new data will be sent to your computer," Beltzner said in a post to the Mozilla developer center blog Monday.
Mozilla had warned users last month that Firefox 2.0, which was slated to be dropped from support, would soon lack antiphishing protection because Google wanted to discontinue the obsolete blacklist protocol that served the aged browser.
Google and Mozilla had worked together to update the protocol, first to SafeBrowsing v2.1 in late 2007, and then to SafeBrowsing v2.2 last year. In December, Mozilla urged people still running Firefox 2.0 to upgrade to the newer Firefox 3.0, which includes a working antiphishing feature.
Beltzner repeated that advice Monday. "If you're running Firefox 22.214.171.124, you can select 'Check for Updates' in the Help menu to receive an update right now," he said in another blog entry.
Mozilla has made three separate upgrade offers to Firefox 2.0 users since August, the most recent on Jan. 8. In notes published last week, however, Mozilla said that the uptake on the offer had not been "very good."
Users running versions older than Firefox 126.96.36.199 can download Firefox 3.0 from Mozilla's site.
If users can't or do not want to upgrade to Firefox 3.0, Beltzner recommended that they disable the setting "Tell me if the site I'm visiting is a suspected forgery" in the Security preferences section of Firefox 2.0's Options dialog box.
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts