Friday, February 21, 2025
Homecyber securityTor Browser 13.0.14 Released - What's New!

Tor Browser 13.0.14 Released – What’s New!

Published on

SIEM as a Service

Follow Us on Google News

The Tor Project has released a new version of the Tor Browser, their secure and private web browsing tool. Tor Browser 13.0.14 includes several critical security updates and bug fixes.

Key Updates in Tor Browser 13.0.14

The latest release of Tor Browser focuses on improving users’ security and privacy. Some of the key updates include:

Security Fixes: The update addresses several security vulnerabilities discovered in the underlying Firefox browser engine. These fixes help protect Tor Browser users from potential exploits.

Tor Network Improvements: The release includes updates to the Tor network software to enhance the reliability and performance of the privacy-preserving network.

User Interface Refinements: Minor user interface tweaks and bug fixes improve the overall browsing experience for Tor Browser users.

Free Live Webinarfor DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register Here.

Platforms that Gets the Update!

All Platforms

  • Updated Tor to version 0.4.8.11
  • Addressed the following bugs:
  • tor-browser#41676: Set privacy.resistFingerprinting.testing.setTZtoUTC as a defense-in-depth measure
  • tor-browser#42335: Do not localize the order of locales for app language
  • tor-browser#42428: Timezone offset leak via document.lastModified
  • tor-browser#42472: Timezone may leak from XSLT Date function
  • tor-browser#42508: Rebase Tor Browser stable onto 115.10.0esr

Windows, macOS, and Linux

  • Updated Firefox to version 115.10.0esr
  • Addressed the following bugs:
  • tor-browser#42172: browser.startup.homepage and TOR_DEFAULT_HOMEPAGE are ignored for the new window opened by New Identity
  • tor-browser#42236: Let users decide whether to load their home page on new identity
  • tor-browser#42468: App languages not sorted correctly in stable

Linux

  • Addressed the following bug:
  • tor-browser-build#41110: Avoid Fontconfig warning about “ambiguous path”

Android

  • Updated GeckoView to version 115.10.0esr
  • Addressed the following bug:
  • tor-browser#42509: Backport Android security fixes from Firefox 125

Tor Browser is a critical tool for anyone looking to browse the web anonymously and protect their online privacy. By routing internet traffic through the Tor network, Tor Browser makes it much harder for users’ activities to be tracked or monitored.

“Tor Browser is an essential tool for journalists, activists, and anyone who values their digital privacy,” said Isabelle Garcia, a spokesperson for the Tor Project. “This latest release ensures Tor Browser remains a secure and reliable way for people to access the internet without compromising their personal information.”

Availability and System Requirements

Tor Browser 13.0.14 is a free download for Windows, macOS, and Linux operating systems. The software can be obtained directly from the Tor Project website at www.torproject.org.

Users will need a computer or mobile device running a compatible operating system to use Tor Browser. Minimum system requirements include at least 100MB of free disk space and 512MB of RAM.

Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...