Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

Microsoft Offers Details on Privacy Features in IE8

New browser will allow user to better control access to surfing history, cookies

Microsoft this week is offering details on new capabilities that will be offered in Internet Explorer 8 to help protect users' privacy as they surf on the Web.

In a post about the browser's privacy enhancements on Microsoft's IE blog, program manager Andy Zeigler describes four new features in IE8, collectively named "InPrivate," that will help users keep others from tracking their surfing behavior.

InPrivate Browsing lets users control whether or not IE saves their browsing history, cookies, and other data. "If you are using a shared PC, a borrowed laptop from a friend, or a public PC, sometimes you don’t want other people to know where you’ve been on the Web," Zeigler writes. "InPrivate Browsing makes that 'over the shoulder' privacy easy by not storing history, cookies, temporary Internet files, or other data."

Microsoft is also adding new features to its "Delete Browsing History" function that will allow users to pick and choose which site cookies to store via the "Favorites" list, the blog says. This feature will enable users to delete history and cookies from their local devices without forcing their favorite sites to "forget" stored passwords and preferences, it states.

In addition to protecting users' browsing histories from local users, InPrivate will help IE8 customers protect themselves from sites that collect and analyze browsing data, Zeigler says.

"InPrivate Blocking is a feature designed to help give you information about third-party content that has a line of sight into your Web browsing, and gives you a choice about what information you share with these sites," the blog says.

InPrivate Blocking can automatically block sites that track users' activity across 10 sites or more. Users can also manually choose items to block or allow, or obtain information about the third-party content directly from the site by clicking the “More information from this website” link.

Users can augment InPrivate Blocking with InPrivate Subscriptions, the blog states. "Some users want to protect their privacy, but don’t want to make granular decisions about content to block or allow," it says. "Users can delegate these decisions to publishers of InPrivate Subscriptions. Users can subscribe to a list the same way they add an Accelerator, Web Slice, or search provider to IE: by clicking a link on a Web page and confirming that they want this functionality."

Under the covers, InPrivate Subscriptions are simply RSS feeds of Regular Expressions that specify sub-downloads to block or allow. "Anyone can publish an InPrivate Subscription on their Website, just as they can offer an Accelerator or Web Slice," Zeigler writes.

The new features will be a part of IE8 Beta 2, which will be available "soon," Zeigler states. The company has not given a date for its release.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8071
PUBLISHED: 2019-10-17
Adobe Download Manager versions 2.0.0.363 have an insecure file permissions vulnerability. Successful exploitation could lead to privilege escalation.
CVE-2019-10752
PUBLISHED: 2019-10-17
Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite.
CVE-2019-12611
PUBLISHED: 2019-10-17
An issue was discovered in Bitdefender BOX firmware versions before 2.1.37.37-34 that affects the general reliability of the product. Specially crafted packets sent to the miniupnpd implementation in result in the device allocating memory without freeing it later. This behavior can cause the miniupn...
CVE-2019-13657
PUBLISHED: 2019-10-17
CA Performance Management 3.5.x, 3.6.x before 3.6.9, and 3.7.x before 3.7.4 have a default credential vulnerability that can allow a remote attacker to execute arbitrary commands and compromise system security.
CVE-2019-15626
PUBLISHED: 2019-10-17
The Deep Security Manager application (Versions 10.0, 11.0 and 12.0), when configured in a certain way, may transmit initial LDAP communication in clear text. This may result in confidentiality impact but does not impact integrity or availability.