{"id":990,"date":"2013-05-14T00:00:00","date_gmt":"2013-05-14T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/14\/ie10-chrome-is-still-the-safest-browser-to-use-corrected\/"},"modified":"2021-12-30T11:38:32","modified_gmt":"2021-12-30T11:38:32","slug":"ie10-chrome-is-still-the-safest-browser-to-use-corrected","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/14\/ie10-chrome-is-still-the-safest-browser-to-use-corrected\/","title":{"rendered":"IE10 &#038; Chrome is still the safest browser to use [corrected]"},"content":{"rendered":"<p>NSS Labs released their latest report on browsers, it shows that though not perfect, Chrome and IE10  is the far ahead of the rest.  But it can be subjective in post report review.<br \/>\nSee the full report at: https:\/\/www.nsslabs.com\/reports\/2013-browser-security-comparative-analysis-socially-engineered-malware<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NSS Labs released their latest report on browsers, it shows that though not perfect, Chrome and IE10 is the far ahead of the rest. But it can be subjective in post report review. See the full report at: https:\/\/www.nsslabs.com\/reports\/2013-browser-security-comparative-analysis-socially-engineered-malware<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-990","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=990"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/990\/revisions"}],"predecessor-version":[{"id":3477,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/990\/revisions\/3477"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}