Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Microsoft Offers Details on Privacy Features in IE8

New browser will allow user to better control access to surfing history, cookies

Microsoft this week is offering details on new capabilities that will be offered in Internet Explorer 8 to help protect users' privacy as they surf on the Web.

In a post about the browser's privacy enhancements on Microsoft's IE blog, program manager Andy Zeigler describes four new features in IE8, collectively named "InPrivate," that will help users keep others from tracking their surfing behavior.

InPrivate Browsing lets users control whether or not IE saves their browsing history, cookies, and other data. "If you are using a shared PC, a borrowed laptop from a friend, or a public PC, sometimes you don’t want other people to know where you’ve been on the Web," Zeigler writes. "InPrivate Browsing makes that 'over the shoulder' privacy easy by not storing history, cookies, temporary Internet files, or other data."

Microsoft is also adding new features to its "Delete Browsing History" function that will allow users to pick and choose which site cookies to store via the "Favorites" list, the blog says. This feature will enable users to delete history and cookies from their local devices without forcing their favorite sites to "forget" stored passwords and preferences, it states.

In addition to protecting users' browsing histories from local users, InPrivate will help IE8 customers protect themselves from sites that collect and analyze browsing data, Zeigler says.

"InPrivate Blocking is a feature designed to help give you information about third-party content that has a line of sight into your Web browsing, and gives you a choice about what information you share with these sites," the blog says.

InPrivate Blocking can automatically block sites that track users' activity across 10 sites or more. Users can also manually choose items to block or allow, or obtain information about the third-party content directly from the site by clicking the “More information from this website” link.

Users can augment InPrivate Blocking with InPrivate Subscriptions, the blog states. "Some users want to protect their privacy, but don’t want to make granular decisions about content to block or allow," it says. "Users can delegate these decisions to publishers of InPrivate Subscriptions. Users can subscribe to a list the same way they add an Accelerator, Web Slice, or search provider to IE: by clicking a link on a Web page and confirming that they want this functionality."

Under the covers, InPrivate Subscriptions are simply RSS feeds of Regular Expressions that specify sub-downloads to block or allow. "Anyone can publish an InPrivate Subscription on their Website, just as they can offer an Accelerator or Web Slice," Zeigler writes.

The new features will be a part of IE8 Beta 2, which will be available "soon," Zeigler states. The company has not given a date for its release.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-13
The FTP client in AceaXe Plus 1.0 allows a buffer overflow via a long EHLO response from an FTP server.
PUBLISHED: 2019-12-13
stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main.
PUBLISHED: 2019-12-13
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer over-read in the function load_sixel at loader.c.
PUBLISHED: 2019-12-13
Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of pa...
PUBLISHED: 2019-12-13
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publi...