Google shuts off antiphishing feature in Firefox 2.0
Mozilla again urges users to upgrade to the newer Firefox 3.0
Although the two most-recent builds of Firefox 2.0, labeled 220.127.116.11 and 18.104.22.168, have omitted the defense, earlier editions of the browser were still able to query Google for a list of sites suspected of hosting identity theft scams. But Google is now shutting down the blacklist, said Mike Beltzner, director of Firefox.
"If you're using a previous version of Firefox 2, even though the feature is enabled in your browser, as of January 20 no new data will be sent to your computer," Beltzner said in a post to the Mozilla developer center blog Monday.
Mozilla had warned users last month that Firefox 2.0, which was slated to be dropped from support, would soon lack antiphishing protection because Google wanted to discontinue the obsolete blacklist protocol that served the aged browser.
Google and Mozilla had worked together to update the protocol, first to SafeBrowsing v2.1 in late 2007, and then to SafeBrowsing v2.2 last year. In December, Mozilla urged people still running Firefox 2.0 to upgrade to the newer Firefox 3.0, which includes a working antiphishing feature.
Beltzner repeated that advice Monday. "If you're running Firefox 22.214.171.124, you can select 'Check for Updates' in the Help menu to receive an update right now," he said in another blog entry.
Mozilla has made three separate upgrade offers to Firefox 2.0 users since August, the most recent on Jan. 8. In notes published last week, however, Mozilla said that the uptake on the offer had not been "very good."
Users running versions older than Firefox 126.96.36.199 can download Firefox 3.0 from Mozilla's site.
If users can't or do not want to upgrade to Firefox 3.0, Beltzner recommended that they disable the setting "Tell me if the site I'm visiting is a suspected forgery" in the Security preferences section of Firefox 2.0's Options dialog box.
Read more about Security in Computerworld's Security Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts