A vulnerability in the K9 installer executable has been fixed. A remote attacker who is able to download a malicious DLL file on a user’s client could use this vulnerability to load and execute malicious code on the user’s client machine. The vulnerability can only be exploited at the time K9 is installed using a vulnerable version of the K9 installer. Blue Coat thanks Himanshu Mehta for reporting the vulnerability.
Fixed Mac OS X Kernel panic and memory leak
Windows 8 Metro App filtering support
Implemented experimental Advanced YouTube Filtering More info...
Added additional configuration options:
Disable HTTPS block notifications
Disable Google SSL redirection
Separate Option for YouTube Safety Mode
Improved HTTPS filtering
Compatibility with more Antivirus and Firewall vendors