Skip to main content

Competitors Gain on Internet Explorer

Love it or hate it, Microsoft’s Internet Explorer has long dominated the Web browser market, recently commanding as much as three quarters of the worldwide browser market. But new preliminary data from Net Applications’ Hitslink service shows that alternative browsers have been steadily gaining ground on IE.

According to the preliminary report, versions of Internet Explorer were used by 68.15 percent of Web surfers during December 2008, which represents a decline from 69.77 percent in November and 71.27 percent in October. And the main browsers to benefit from IE’s decline are Firefox, Apple’s Safari, and Google’s Chrome browser, which racked up shares of 21.34 percent, 7.93 percent, and 1.04 percent, respectively, during December 2008. The month marks the first time Google’s Chrome—which is only available for Windows and only just came out of beta—topped a 1 percent share. December is also only the second month in which Firefox topped a 20 percent share.

Net Applications notes that the end-of-year holidays may skew December’s numbers a bit, as more Web users are likely to access the Internet from home rather than work, potentially skewing results in favor of browsers like Safari that may have a higher usage among residential users.

Net Applications bases its analysis on cumulative statistics gathered from sites that use its traffic monitoring service; according to the company, the statistics are generated based on 160 million Web users per month.

Editors' Recommendations

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
Use Comcast for internet? Your personal data may have been hacked
A building with the Xfinity logo on it.

Comcast, alongside several other big corporations, has recently suffered a devastating data breach. According to reports, it's possible that hackers got their hands on the data of up to 36 million Comcast Xfinity customers, meaning the company's cable television and internet department. Although the company is pretty tight-lipped about it, the data breach occurred over two months ago. Here's what we know and what you should do to protect yourself.

The hackers were able to access those masses of customer information through a vulnerability known as "CitrixBleed." It's found in Citrix networking devices that Comcast and other huge corporations use. The exploit was initially discovered in August and appears to have been used in cyberattacks on not just Comcast but also many other companies, including Boeing.

Read more
What is Grok? Elon Musk’s controversial ChatGPT competitor explained
A digital image of Elon Musk in front of a stylized background with the Twitter logo repeating.

Grok! It might not roll off the tongue like ChatGPT or Windows Copilot, but it's a large language model chatbot all the same. Developed by xAI, an offshoot of the programmers who stuck around after Elon Musk purchased X (formerly known as Twitter), Grok is designed to compete directly with OpenAI's GPT-4 models, Google's Bard, and a range of other public-facing chatbots.

Launched in November 2023, Grok is designed to be a chatbot with less of a filter than other AIs. It's said to have a "bit of wit, and has a rebellious streak."
It's only for X Premium users

Read more
Malicious bots make up 73% of internet traffic, report says
italy agcom pirate anti piracy download bay software keyboard skull music cyber crime

In a concerning revelation by the fraud control platform Arkose Labs, about 73% of internet traffic to websites and apps that was analyzed between January and September 2023 has been attributed to bots engaging in malicious activities. This revelation sparks discussions about the significant drain on valuable resources caused by such nefarious actions.

The third quarter of 2023 witnessed the dominance of five primary categories of bad bot activities, including account takeover, scraping, fake account creation, account management, and in-product abuse. This is similar to the second quarter, with the notable exception of in-product abuse stepping in for card testing.

Read more