Is Firefox’s position vulnerable in 2010?

For the last few years, Firefox has been the alternative browser of choice. But could it be running out of steam, wonders Simon Brew…

It's Google's Chrome though that's slowly but surely gaining ground, tripling its slice of the market to 4.63 per cent in 2009, and overtaking the long-established Safari in the process. It's done this with a product still very much in its infancy, with a brand new version due later this year.

What's more, as these words are being written, Google has invested in a massive UK billboard advertising campaign for its browser (albeit with posters that don't really explain what Chrome is for those who have never heard of it), and it's a sure sign of the investment that the firm is pumping into its product.

Combined with the release of the Chrome operating system later this year, this is a brand that Google is going to be getting behind. And given that it has far more resources than Firefox, it has plenty of power to fight with.

Target

All of this has come at a point where, ironically, Firefox is something of a target for some itself. It's the psychological problem when the underdog moves to become part of the status quo, in that it loses a little of its instant appeal in the process.

In the case of Firefox, it's inevitably proven to be vulnerable to malware on Windows. And given how many people use the browser, it's becoming increasingly worthwhile for malware writers to target its vulnerabilities.

Mozilla argues that just because user numbers increase, it doesn't mean that security problems follow, but there's inevitably a little correlation somewhere along the line. That said, in Firefox's corner of course is the fact that it's quicker and more efficient at patching security holes than Internet Explorer.

Featured Resources

Humility in AI: Building trustworthy and ethical AI systems

How humble AI can help safeguard your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Download now

Why you need to include the cloud in your disaster recovery plan

Preserving data for business success

Download now

Most Popular

350,000 Spotify users hacked in credential stuffing attack
Security

350,000 Spotify users hacked in credential stuffing attack

24 Nov 2020
46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020
Samsung Galaxy Note might be discontinued in 2021
Mobile Phones

Samsung Galaxy Note might be discontinued in 2021

1 Dec 2020