Cloud Computing for Government Efficiency and Transparency

Government Cloud Computing

Subscribe to Government Cloud Computing: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cloud Computing: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

GovCloud Authors: Yeshim Deniz, Elizabeth White, Kevin Jackson, Pat Romanski, Liz McMillan

Related Topics: Online Shopping

Online Shopping: Article

IE Flaws Are Helping Drive Record Opera Downloads, Claims CEO

Opera 8.51 Proves Popular With Security-Conscious Users; More Than 1M Downloads in First Week Alone

The recent detection of additional, severe security flaws in Internet Explorer is apparently helping drive record downloads of Opera 8.51, the latest version of Opera's award-winning Web browser - which, since its debut less than one week ago, has been downloaded by more than one million people.

"It's clear that consumers want a safer online experience, particularly during the busiest online shopping season of the year," said Opera Software's CEO Jon von Tetzchner (pictured). 

"We do everything we can to keep our users safe," he continued. "That means introducing innovations such as the yellow security bar and constantly reviewing and testing our browser for vulnerabilities. These are necessary steps to stay ahead of the most advanced cyber criminals."

Already the safest browsing option available according to what von Tetzchner calls independent tests, Opera 8.51 - he says - provides additional security fixes that help protect individuals from identity theft and other cyber fears.

"Javelin Research estimates that more than 9.3 million U.S. citizens had their identity stolen last year, with more than 11% falling victim through online scams," von Tetzchner points out. His company, he adds, has prepared a guide to shopping safely online at

More Stories By Security News Desk

SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.