You are currently viewing a snapshot of www.mozilla.org taken on April 21, 2008. Most of this content is highly out of date (some pages haven't been updated since the project began in 1998) and exists for historical purposes only. If there are any pages on this archive site that you think should be added back to www.mozilla.org, please file a bug.



Security Center

Whether you're using the Web or checking your email, you care about your security and privacy. In the Mozilla project we understand the importance of security. Here you will find alerts and announcements on security and privacy issues, general tips for surfing the Web and using email more securely, more information about how we maintain and enhance the security of our products, and useful links for Web developers.

On this page:

Security Alerts & Announcements

Security Update (April 16, 2008): A security update has been issued for Firefox that fixes a security vulnerability and stability issue experienced by some users. All users should install this update as soon as possible.

Users should get an automatic update notification; users who have turned off update notification can use the "Check for Updates..." item on the Help menu. If the menu item is disabled you will have to install from a more privileged user account. Contact your site's computer support staff for help, or help is available through our Community Support.

Security Update (March 25, 2008): Security updates have been issued for Firefox that fix critical security vulnerabilities. All users should install this update as soon as possible.

Previous alerts and announcements

Tips for Secure Browsing

  • Always use the most current version of your browser.
  • Check for the "lock" icon on the status bar that shows that you are on a secured web site. Also check that the URL begins with "https" in the location bar when making transactions online.
  • In the Tools menu of Firefox, Tools > Options... > Privacy, you can clear your information with one click of a button. This is especially useful when using a computer in a public location.
  • Perform transactions (like shopping or submitting personal information) at sites that are well established and that are familiar to you. If you're not familiar with a site, make sure that the site has a privacy policy and information about the site's security measures.

Tips for Using Email Securely

  • Be aware that it is extremely easy for someone to forge an email message to make it appear as if the message has been sent by your bank, a software vendor (e.g., Microsoft), or another entity with whom you do business. If a message requests that you send your password or other private information, or asks that you run or install an attached file, then it is very likely that the message is not legitimate. When in doubt, just mark the message as "junk" and delete it.
  • Be cautious when clicking on links sent to you in email messages. If you do click on such a link, double-check the name of the site as shown in the location bar of the browser, and be especially careful if the site name displayed is an IP address (e.g., "192.168.25.75") instead of a domain name (e.g., "www.example.com"); in the former case it is very likely the site is not legitimate. Don't enter any personal information into forms displayed at such a site, and if you have any concerns whatsoever about your security, just close the browser window.

For Developers: Contacting Mozilla

Report security-related bugs and learn more about how we secure our products:

  • If you believe that you've found a Mozilla-related security vulnerability, please report it by sending email to the address security@mozilla.org. Note that your report may be eligible for a reward; see below.
  • For more information on how to report security vulnerabilities and how the Mozilla community will respond to such reports, see our policy for handling security bugs.
  • We want to make Firefox, Thunderbird, the Mozilla Suite, and other Mozilla products as secure as possible, and want to encourage research, study, timely disclosure, and rapid fixing of any serious security vulnerabilities. We've established a Security Bug Bounty Program to reward people who help us reach that objective.
  • Mozilla-based products include a default list of CA certificates used when connecting to SSL-enabled servers and in other contexts. If you are a CA and would like your CA certificate(s) considered for inclusion in Mozilla, please see the Mozilla CA certificate policy.
  • We encourage you to learn more about our Mozilla security projects and participate in the development of security features and capabilities in our products.

Press Contact: Steve Naventi, 415-392-8282, or send mail to press@mozilla.com.

The PGP key for security@mozilla.org can be used to send encrypted mail or to verify responses received from that address.

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.3 (MingW32)
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=QlM5
-----END PGP PUBLIC KEY BLOCK-----