	{"id":579,"date":"2008-12-11T11:05:55","date_gmt":"2008-12-11T10:05:55","guid":{"rendered":"http:\/\/blog.intego.com\/?p=579"},"modified":"2008-12-11T11:05:55","modified_gmt":"2008-12-11T10:05:55","slug":"google-publishes-browser-security-handbook","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/","title":{"rendered":"Google Publishes Browser Security Handbook"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/google_code.png\"><\/p>\n<p>Google has published an on-line <a href=\"http:\/\/code.google.com\/p\/browsersec\/wiki\/Main\">Browser Security Handbook<\/a>, a comprehensive document written for &#8220;web application developers, browser engineers, and information security researchers&#8221; as a &#8220;one-stop reference to key security properties of contemporary web browsers&#8221;. The document states that &#8220;Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities.&#8221;<\/p>\n<p>The document currently covers the following browsers: Microsoft Internet Explorer 6 and 7, Mozilla Firefox 2 and 3, Apple Safari, Opera, Google Chrome, and the Android embedded browser. It is likely that it will be kept up to date as browser versions and security issues change.<\/p>\n<p>This is a very dense document, designed for developers and engineers, not for the general public. It goes into great detail on the different ways browsers work with URLs, how they handle different types of HTTP headers, how they handle non-standard HTML, the way they deal with Javascript and other scripting languages, how they process CSS stylesheets, and more. It then discusses the basic security issues that face web browsers and how they react to different calls and requests.<\/p>\n<p>Browser security is complex and deserves this type of approach, which analyzes problems and compares behavior. This document will be a valuable tool for developers and security researchers alike.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google has published an on-line Browser Security Handbook, a comprehensive document written for &#8220;web application developers, browser engineers, and information security researchers&#8221; as a &#8220;one-stop reference to key security properties of contemporary web browsers&#8221;. The document states that &#8220;Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,11],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Google has published an on-line Browser Security Handbook, a comprehensive document written for &quot;web application developers, browser engineers, and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Publishes Browser Security Handbook - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Google has published an on-line Browser Security Handbook, a comprehensive document written for &quot;web application developers, browser engineers, and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-12-11T10:05:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/google_code.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/google_code.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/google_code.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/\",\"name\":\"Google Publishes Browser Security Handbook - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#primaryimage\"},\"datePublished\":\"2008-12-11T10:05:55+00:00\",\"dateModified\":\"2008-12-11T10:05:55+00:00\",\"description\":\"Google has published an on-line Browser Security Handbook, a comprehensive document written for \\\"web application developers, browser engineers, and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google Publishes Browser Security Handbook\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Google Publishes Browser Security Handbook\",\"datePublished\":\"2008-12-11T10:05:55+00:00\",\"dateModified\":\"2008-12-11T10:05:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#webpage\"},\"wordCount\":214,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/google_code.png\",\"articleSection\":[\"Security &amp; Privacy\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Google has published an on-line Browser Security Handbook, a comprehensive document written for \"web application developers, browser engineers, and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/","og_locale":"en_US","og_type":"article","og_title":"Google Publishes Browser Security Handbook - The Mac Security Blog","og_description":"Google has published an on-line Browser Security Handbook, a comprehensive document written for \"web application developers, browser engineers, and","og_url":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-12-11T10:05:55+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/google_code.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/google_code.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/google_code.png"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/","name":"Google Publishes Browser Security Handbook - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#primaryimage"},"datePublished":"2008-12-11T10:05:55+00:00","dateModified":"2008-12-11T10:05:55+00:00","description":"Google has published an on-line Browser Security Handbook, a comprehensive document written for \"web application developers, browser engineers, and","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Google Publishes Browser Security Handbook"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Google Publishes Browser Security Handbook","datePublished":"2008-12-11T10:05:55+00:00","dateModified":"2008-12-11T10:05:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#webpage"},"wordCount":214,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-publishes-browser-security-handbook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/google_code.png","articleSection":["Security &amp; Privacy","Software &amp; Apps"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9l","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/579"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=579"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/579\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}