Security Center
Whether you're using the Web or checking your email, you care about your security and privacy. In the Mozilla project we understand the importance of security. Here you will find alerts and announcements on security and privacy issues, general tips for surfing the Web and using email more securely, more information about how we maintain and enhance the security of our products, and useful links for Web developers.
On this page:
- Security Alerts & Announcements
- Tips for Secure Browsing
- Tips for Using Email Securely
- For Developers: Contacting Mozilla
Security Alerts & Announcements
- Mozilla Foundation Security Advisories for all products
- Known vulnerabilities listed by product
Security Update (April 16, 2008): A security update has been issued for Firefox that fixes a security vulnerability and stability issue experienced by some users. All users should install this update as soon as possible.
Users should get an automatic update notification; users who have turned off update notification can use the "Check for Updates..." item on the Help menu. If the menu item is disabled you will have to install from a more privileged user account. Contact your site's computer support staff for help, or help is available through our Community Support.
Security Update (March 25, 2008): Security updates have been issued for Firefox that fix critical security vulnerabilities. All users should install this update as soon as possible.
Previous alerts and announcements
Tips for Secure Browsing
- Always use the most current version of your browser.
- Check for the "lock" icon on the status bar that shows that you are on a secured web site. Also check that the URL begins with "https" in the location bar when making transactions online.
- In the Tools menu of Firefox, Tools > Options... > Privacy, you can clear your information with one click of a button. This is especially useful when using a computer in a public location.
- Perform transactions (like shopping or submitting personal information) at sites that are well established and that are familiar to you. If you're not familiar with a site, make sure that the site has a privacy policy and information about the site's security measures.
Tips for Using Email Securely
- Be aware that it is extremely easy for someone to forge an email message to make it appear as if the message has been sent by your bank, a software vendor (e.g., Microsoft), or another entity with whom you do business. If a message requests that you send your password or other private information, or asks that you run or install an attached file, then it is very likely that the message is not legitimate. When in doubt, just mark the message as "junk" and delete it.
- Be cautious when clicking on links sent to you in email messages. If you do click on such a link, double-check the name of the site as shown in the location bar of the browser, and be especially careful if the site name displayed is an IP address (e.g., "192.168.25.75") instead of a domain name (e.g., "www.example.com"); in the former case it is very likely the site is not legitimate. Don't enter any personal information into forms displayed at such a site, and if you have any concerns whatsoever about your security, just close the browser window.
For Developers: Contacting Mozilla
Report security-related bugs and learn more about how we secure our products:
- If you believe that you've found a Mozilla-related security vulnerability, please report it by sending email to the address security@mozilla.org. Note that your report may be eligible for a reward; see below.
- For more information on how to report security vulnerabilities and how the Mozilla community will respond to such reports, see our policy for handling security bugs.
- We want to make Firefox, Thunderbird, the Mozilla Suite, and other Mozilla products as secure as possible, and want to encourage research, study, timely disclosure, and rapid fixing of any serious security vulnerabilities. We've established a Security Bug Bounty Program to reward people who help us reach that objective.
- Mozilla-based products include a default list of CA certificates used when connecting to SSL-enabled servers and in other contexts. If you are a CA and would like your CA certificate(s) considered for inclusion in Mozilla, please see the Mozilla CA certificate policy.
- We encourage you to learn more about our Mozilla security projects and participate in the development of security features and capabilities in our products.
Press Contact: Steve Naventi, 415-392-8282, or send mail to press@mozilla.com.
The PGP key for security@mozilla.org can be used to send encrypted mail or to verify responses received from that address.
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.3 (MingW32) mQGiBELuiHkRBACzYrGGdElFoB50tk1h88rd3QPnZfHFZhGOvl9QzXOjFl2B41AD iJ1xc53EGINv+OkFEs9Fudtn6PTODga1gY2aLwJbOVyH0LOZI+lZYsWGIL45Mb3b wDkWwug/xRJxLicxSVhIkY9ZSiHrnh1Qg6zxHaNkPYRShYzGbyMpoEgs+wCg+mZm vnqtEkFGSpTYPyV7Rox0LlEEAJA0oyzFfx6RraoSNnc577bAmYV7ZjRrY5eFrI83 gz2ublUb4fz7Oa3DZm4X22CvtXENyk1UrwTKNWQBhZh2A7AW4sg4AoFrujV1CvT2 kBSA5eXwKsiM+e8sYRL2SBA3EJugBJEM/CWTWlCvijPtJg2CHGKnP3RlIDV7nCKA XChNA/9Jf3t0XCMywz5PUfEG+q0ZCmlQAMDmi7lRVHn31B0ZfY/MUhJXVCqaGn1D O02uEGckVFuy6qLipYDPS4vPnyaFgb9ebvsEWJt5zD2byPd0K6uXq9q5+cZ8uIi8 5XoAyYza3EwiFC9bGm9QkGd4zHsSRQja/75glT/d2M7Qq2ZrkLQnTW96aWxsYSBT ZWN1cml0eSA8c2VjdXJpdHlAbW96aWxsYS5vcmc+iGQEExECACQFAkLuiHkCGwMF CQlmAYAGCwkIBwMCAxUCAwMWAgECHgECF4AACgkQlqJHOA2KtxbQWQCgofEFJhYS cb0hyFFVkDlBQRxE4cIAnRQFyoWkFv+W9mdURTKcD+ztEsmVuQINBELuiIMQCADk O/yxxmbD++Y0elZ6x4t4wEdAbiR8CsnLIyKVzFc+xDNrjOyxxuy+IJ3co233Rl/X EA+0amZW8yIpTojKqTzii87Qh3YU+LhulEeYT5viSue0PlTLZwsqD7vBs7Bs/2ho IVPZ7i5q98zNWw4Sx5X+gAf0HsDHYLWIYDp85R9Y9x29YoP6zwZ177+Ol6fZhMju cCs0yoyxMP0gs/moqIXGJ7YGHlm7X0Re6XF+lt1iQZRHrQuA9TLgBOw7KtdHjPbJ +eXVFIJ30fWIC2hrK04xgAelUqYbd5rYKToXpbULRfvCE74rlYNwAYFca8p4hOjW p04Mcj0yjZfFTOSKwz83AAMFCACdFLpPT3CYr7NhyXuahmirvuWo0oqJIeJ3tU3B g/2qPgZ/wp7ANPa6TKz+S9HonIwfIvwJl7V+VTJDnbVbc8f1DF2IPXkbvSnSi430 Uemp3+fBo2LZ2y7dCK8XP8NOiP/M8yOsS3u8PzW9EXkucuxmOT1edwiJ81BACvD2 BbHuWNuLcBveVaPkYyfYONXQ/zlYa+Yvn2zGXPlB0eqCMD4RgyZ0VeyUIjyFq/JK XBGBWbbFph3+tTEimkTvoNsGxgPNNV0i8lzWp/UXhm0rHV1GLQ31Ak4K6R/S+Fpv uRCYW8vMPQ65GxaOW2bBF3ymTf+2ehRgYZjFxzAS7JgI7XB/iE8EGBECAA8FAkLu iIMCGwwFCQlmAYAACgkQlqJHOA2KtxbMuwCeKcVcuJ98HNlKMWWmM9DDdtckCuAA n1X1+Lod8A2PyaXt5vhaGZnzpbEG =QlM5 -----END PGP PUBLIC KEY BLOCK-----