Risk
1/21/2014
10:23 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Adblock Plus Available For Safari

The Adblock Plus add-on is now available for every major browser

Cologne, Germany – January 21, 2014 – Adblock Plus, the #1 most popular browser extension for blocking annoying online advertisements, today announced that Adblock Plus for Safari is officially available for download worldwide. Mac owners are now free to rejoice in their own ad-free web experience.

With the inclusion of Safari, the Adblock Plus add-on is now available for every major browser: Chrome, Firefox, Internet Explorer, Opera, Safari--and also Android mobile OS.

Adblock Plus lets users choose whether to block all ads or allow certain Acceptable Ads to be whitelisted in order to support free content. In all cases, Adblock Plus blocks annoying banner ads and pop-ups on web pages, video ads on YouTube, and intrusive ads on Facebook.

"Our goal is to make the Internet better for everyone by empowering people to block obnoxious ads while simultaneously encouraging websites to run user-friendly, responsible advertisements instead of intrusive banners, overlays, and pop-ups," said Till Faida, co-founder of Adblock Plus and the open source project that supports it. "Users can still opt to block all ads, or they can whitelist certain sites that they want to support. We created Adblock Plus to give every user control over which kinds of ads they are willing to accept, and then we block all the rest."

Faida continued, "The Adblock Plus add-on works on all current versions of Safari and is backwards-compatible to version 6.0 (standard version with OSX Mountain Lion). The current version is a stable beta; it's been thoroughly tested, but we are still hoping to get valuable user feedback to optimize performance."

Links:

- Get Adblock Plus for Safari: https://adblockplus.org/en/safari

- Install Adblock Plus for Chrome, Firefox, Internet Explorer, Safari, Opera or Android: www.adblockplus.org

- Download Adblock Plus for Android: https://adblockplus.org/en/android-install

About Adblock Plus

Adblock Plus is a community-driven, open source project to rid the Internet of annoying and intrusive online advertising. Its free web browser extensions (add-ons) put users in control by letting them block or filter which ads they want to see. Users across the world have downloaded Adblock Plus over 250 million times. It has remained the most downloaded and the most used extension almost continuously since November 2006. In 2013 PC Magazine listed the extension as one of the best free Google Chrome extensions, and it received a 2013 About.com readers' choice award for best privacy/security add-on.

Follow AdBlock Plus on Twitter at @AdBlockPlus and read our blogs at http://adblockplus.org/blog/. For more information, please visit https://eyeo.com/en/press.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web