Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Microsoft Offers Details on Privacy Features in IE8

New browser will allow user to better control access to surfing history, cookies

Microsoft this week is offering details on new capabilities that will be offered in Internet Explorer 8 to help protect users' privacy as they surf on the Web.

In a post about the browser's privacy enhancements on Microsoft's IE blog, program manager Andy Zeigler describes four new features in IE8, collectively named "InPrivate," that will help users keep others from tracking their surfing behavior.

InPrivate Browsing lets users control whether or not IE saves their browsing history, cookies, and other data. "If you are using a shared PC, a borrowed laptop from a friend, or a public PC, sometimes you don’t want other people to know where you’ve been on the Web," Zeigler writes. "InPrivate Browsing makes that 'over the shoulder' privacy easy by not storing history, cookies, temporary Internet files, or other data."

Microsoft is also adding new features to its "Delete Browsing History" function that will allow users to pick and choose which site cookies to store via the "Favorites" list, the blog says. This feature will enable users to delete history and cookies from their local devices without forcing their favorite sites to "forget" stored passwords and preferences, it states.

In addition to protecting users' browsing histories from local users, InPrivate will help IE8 customers protect themselves from sites that collect and analyze browsing data, Zeigler says.

"InPrivate Blocking is a feature designed to help give you information about third-party content that has a line of sight into your Web browsing, and gives you a choice about what information you share with these sites," the blog says.

InPrivate Blocking can automatically block sites that track users' activity across 10 sites or more. Users can also manually choose items to block or allow, or obtain information about the third-party content directly from the site by clicking the “More information from this website” link.

Users can augment InPrivate Blocking with InPrivate Subscriptions, the blog states. "Some users want to protect their privacy, but don’t want to make granular decisions about content to block or allow," it says. "Users can delegate these decisions to publishers of InPrivate Subscriptions. Users can subscribe to a list the same way they add an Accelerator, Web Slice, or search provider to IE: by clicking a link on a Web page and confirming that they want this functionality."

Under the covers, InPrivate Subscriptions are simply RSS feeds of Regular Expressions that specify sub-downloads to block or allow. "Anyone can publish an InPrivate Subscription on their Website, just as they can offer an Accelerator or Web Slice," Zeigler writes.

The new features will be a part of IE8 Beta 2, which will be available "soon," Zeigler states. The company has not given a date for its release.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jim, stop pretending you're drowning in tickets."
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-07-16
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
PUBLISHED: 2019-07-16
A vulnerability in various versions of Iomega and LenovoEMC NAS products could allow an unauthenticated user to access files on NAS shares via the API.
PUBLISHED: 2019-07-16
Norton Password Manager, prior to, may be susceptible to an address spoofing issue. This type of issue may allow an attacker to disguise their origin IP address in order to obfuscate the source of network traffic.
PUBLISHED: 2019-07-16
Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 allow Directory Traversal.
PUBLISHED: 2019-07-16
Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 5 of 6).