Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Microsoft Offers Details on Privacy Features in IE8

New browser will allow user to better control access to surfing history, cookies

Microsoft this week is offering details on new capabilities that will be offered in Internet Explorer 8 to help protect users' privacy as they surf on the Web.

In a post about the browser's privacy enhancements on Microsoft's IE blog, program manager Andy Zeigler describes four new features in IE8, collectively named "InPrivate," that will help users keep others from tracking their surfing behavior.

InPrivate Browsing lets users control whether or not IE saves their browsing history, cookies, and other data. "If you are using a shared PC, a borrowed laptop from a friend, or a public PC, sometimes you don’t want other people to know where you’ve been on the Web," Zeigler writes. "InPrivate Browsing makes that 'over the shoulder' privacy easy by not storing history, cookies, temporary Internet files, or other data."

Microsoft is also adding new features to its "Delete Browsing History" function that will allow users to pick and choose which site cookies to store via the "Favorites" list, the blog says. This feature will enable users to delete history and cookies from their local devices without forcing their favorite sites to "forget" stored passwords and preferences, it states.

In addition to protecting users' browsing histories from local users, InPrivate will help IE8 customers protect themselves from sites that collect and analyze browsing data, Zeigler says.

"InPrivate Blocking is a feature designed to help give you information about third-party content that has a line of sight into your Web browsing, and gives you a choice about what information you share with these sites," the blog says.

InPrivate Blocking can automatically block sites that track users' activity across 10 sites or more. Users can also manually choose items to block or allow, or obtain information about the third-party content directly from the site by clicking the “More information from this website” link.

Users can augment InPrivate Blocking with InPrivate Subscriptions, the blog states. "Some users want to protect their privacy, but don’t want to make granular decisions about content to block or allow," it says. "Users can delegate these decisions to publishers of InPrivate Subscriptions. Users can subscribe to a list the same way they add an Accelerator, Web Slice, or search provider to IE: by clicking a link on a Web page and confirming that they want this functionality."

Under the covers, InPrivate Subscriptions are simply RSS feeds of Regular Expressions that specify sub-downloads to block or allow. "Anyone can publish an InPrivate Subscription on their Website, just as they can offer an Accelerator or Web Slice," Zeigler writes.

The new features will be a part of IE8 Beta 2, which will be available "soon," Zeigler states. The company has not given a date for its release.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.