Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • Rajiv Kulkarni Talks about the Malware Analysis Pipeline
    • IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    • IBM Think 2022 – Embracing the Present, Preparing for the Future
    • A Game of Numbers: The Correlation Between Technology and Sports Betting
    • Software-based Enterprise Solutions for Navigating the “Too Much Information” Age
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 15, 2022

      A Look At The Last Generation Of Internal Combustion Engines

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 23, 2022

      IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

      May 14, 2022

      Ransomware is Indiscriminatory – Prepare for Everything to Fail

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

      May 18, 2022

      Software-based Enterprise Solutions for Navigating the “Too Much Information” Age

    TechSpective
    You are at:Home»Internet»Browsers»Pwn2Own hackathon brings Chrome, Safari, Internet Explorer and Firefox to their knees

    Pwn2Own hackathon brings Chrome, Safari, Internet Explorer and Firefox to their knees

    0
    By Tejiri Jeroh on March 22, 2015 Browsers, Chrome, Firefox, Internet Explorer, Safari, Security

    How secure is your Internet browser? Not very secure apparently. It took ethical hackers at Pwn2Own less than a day to prove it.

    Researchers engage in the annual Pwn2Own hacking contest at the CanSecWest conference in Vancouver. There are cash prizes for demonstrating the use of remote exploits to hack the four major browsers, as well as the Adobe Reader and Flash Player plugins.

    The star of the day was South Korean security researcher and hacker Jung Hoon Lee. The serial browser hacker–known in online circles as “lokihardt”—took home a cash prizes totaling $225,000 in addition to the brand new laptops provided for the event.

    Jung Hoon Lee successfully exploited Internet Explorer, Firefox and Chrome browsers on Microsoft’s Windows, and hacked Safari on Mac OS X. Remarkably, Jung Hoon Lee accomplished this feat singlehandedly even though his opponents generally worked in teams.

    PCworld broke down his $225,000 haul as follows; “$75,000 for the Chrome bug, an extra $25,000 for a privilege escalation to SYSTEM and another $10,000 for also hitting the browser’s beta version—for a total of $110,000. The IE11 exploit earned him an additional $65,000 and the Safari hack $50,000.”

    Mozilla’s Firefox ended up being the most exploited browser of the day as other individuals and teams successfully exploited vulnerabilities in the browser. A researcher with the hacker handle “ilxu1a’ successfully hacked Firefox on Windows but ran out of time while exploiting Google’s Chrome. Another researcher Mariusz Mlynski, earned $30,000 for also hacking Firefox and an additional $25,000 for exploiting a Windows flaw to gain system privileges.

    A merger between two Chinese teams—Team509 and KeenTeams— successfully exploited flaws in Flash Player running in Internet Explorer 11 on Windows 10 and received an $85,000 pay off. The KeenTeam then teamed up with Jun Mao to successfully exploit a flaw in the Windows Kernel which earned them an additional $55,000.

    Nicolas Joly—a former representative of French security firm Vupen—singlehandedly hacked Adobe Reader and Flash Player which earned him $90,000.

    There is nothing all that shocking about the Pwn2Own results. Researchers demonstrate year after year that there simply is no such thing as impenetrable software. Given enough time and dedication researchers (or attackers) will find a way to exploit and hack an application. Pwn2Own provides the vendors with valuable insight into how to make their software more secure, and it provides the general public with a valuable lesson to always be vigilant because anything can be hacked.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWindows 10 launching this summer as free upgrade even for pirated versions of Windows
    Next Article March Madness cybercrooks hope to bust more than just your brackets
    Tejiri Jeroh

    I am first and foremost and inquisitive being with a professional background in Systems Engineering which means I love to figure systems out, dabble here and there with all things tech related and devise plans to take over the world. …And in the words of Anton Checkov, Engineering is my wife while writing is my mistress. I am a webmaster who also writes Afrocentric articles on my blog. (www.omnicorpseo.com) and loves football. Finally, I can’t go without saying hi to my wife…so, “Hi dear” and Hi All!

    Related Posts

    Rajiv Kulkarni Talks about the Malware Analysis Pipeline

    IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    Ransomware is Indiscriminatory – Prepare for Everything to Fail

    Comments are closed.

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    May 15, 2022

    A Look At The Last Generation Of Internal Combustion Engines

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Adobe
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    Coffee and Politics
    PopSpective
    Adobe
    PopSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    Adobe

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.