New internet explorer 7 security features

Entry Notes

Posted: 04152007
Author: Emm Schmitt
Category: Microsoft OS family



As more people, businesses, and organizations establish a presence online, the world becomes an increasingly connected place. And the more connected the world becomes, the more opportunities arise for communicating with others, doing research, sharing information, and collaborating on projects. The flip side to this new connectedness is the increased risk of connecting with a remote user whose intentions are less than honorable. It could be a fraud artist who sets up a legitimate-looking website to steal your password or credit card number, a virus programmer who sends a Trojan horse attached to a program download, or a website operator who uses web browser security holes to run malicious code on your machine.

Admittedly, online security threats are relatively rare and are no reason to swear off the online world. However, these threats do exist and people fall victim to them every day. Luckily, protecting yourself from these and other e-menaces does not take much effort or time, particularly with the new security features built into Internet Explorer 7.

Protected Mode: Reducing Internet Explorer's Privileges

Windows Vista's antispyware initiatives aren't restricted to Windows Defender. Because spyware often leeches onto a system through a drive-by or pop-up download, it makes sense to set up the web browser as the first line of defense. Microsoft has done just that by introducing Protected mode for Internet Explorer. Protected mode builds upon Vista's new User Account Control featur. Internet Explorer's Protected mode means that IE runs with a privilege level that's enough to surf the Web, but that's about it. Internet Explorer can not install software, modify the user's files or settings, add shortcuts to the Startup folder, or even change its own settings for the default home page and search engine. The Internet Explorer code is completely isolated from any other running application or process on your system. In fact, Internet Explorer can write data only to the Temporary Internet Files folder. If it needs to write elsewhere (during a file download, for example), it must get your permission. So any add-ons or other malware that attempt a covert install via Internet Explorer will be blocked before they can even get to Windows Defender. Internet Explorer 7 implements Protected mode to prevent covert spyware installs.

Note

If you do not want to run Internet Explorer 7 in Protected mode, for some reason, you can turn it off. Select Tools, Internet Options, and then select the Security tab. Remove the checkmark from the Enable Protected Mode check box to deactivate it, and then click OK. Internet Explorer displays a message in the Information bar telling you that your security settings are putting you at risk. You can reactivate the Protected mode setting by clicking the Information bar and then clicking Fix Settings For Me. Otherwise, restart Internet Explorer to put the new setting into effect. Internet Explorer, ever persistent, will display a local SecurityRisk page that warns you about your security settings. Click the Home button to continue browsing.

Total Security: Internet Explorer Without Add-Ons

For the ultimate in browsing security, Windows Vista ships with an alternative Internet Explorer shortcut that loads the browser without any third-party add-ons, extensions, toolbars, or ActiveX controls. Select Start, All Programs, Accessories, System Tools, Internet Explorer (No Add-Ons). Internet Explorer starts and displays the Add-Ons Disabled page. Select the Internet Explorer (No Add-Ons) shortcut to run Internet Explorer without third-party add-ons, extensions, toolbars, or ActiveX controls.

Thwarting Phishers with the Phishing Filter

Phishing refers to creating a replica of an existing web page to fool a user into submitting personal, financial, or password data. The term comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data. The most common ploy is to copy the web page code from a major sitesuch as AOL or eBayand use that code to set up a replica page that appears to be part of the company's site. (This is why phishing is also called spoofing.) A fake email is sent out with a link to this page, which solicits the user's credit card data or password. When the form is submitted, it sends the data to the scammer while leaving the user on an actual page from the company's site so he or she does not suspect a thing.

A phishing page looks identical to a legitimate page from the company because the phisher has simply copied the underlying source code from the original page. However, no spoof page can be a perfect replica of the original. Here are five things to look for:

  • The URL in the Address bar A legitimate page will have the correct domainsuch as aol.com or ebay.comwhile a spoofed page will have only something similarsuch as aol.whatever.com or blah.com/ebay.

    Note

    With some exceptions (see the following discussion of domain spoofing), the URL in the Address bar is usually the easiest way to tell whether a site is trustworthy. For this reason, Internet Explorer 7 makes it impossible to hide the Address bar in all browser windows, even simple pop-ups.

  • The URLs associated with page links Most links on the page probably point to legitimate pages on the original site. However, some links might point to pages on the phisher's site.

  • The form-submittal address Almost all spoof pages contain a form into which you're supposed to type whatever sensitive data the phisher seeks from you. Select View, Source, and look at the value of the <form> tag's action attribute. This will be the address to which the form will be submitted. If the form data is clearly not being sent to the legitimate domain, you know you're dealing with a phisher.

  • Text or images that aren't associated with the trustworthy site Many phishing sites are housed on free web hosting services. However, many of these services place an advertisement on each page, so look for an ad or other content from the hosting provider.

  • Internet Explorer's lock icon in the status bar and Security Report area A legitimate site would transmit sensitive financial data only using a secure HTTPS connection, which Internet Explorer indicates by placing a lock icon in the status bar and in the Address bar's new Security Report area. If you do not see the lock icon with a page that asks for financial data, the page is almost certainly a spoof.

If you watch for these things, you'll probably never be fooled into giving up sensitive data to a phisher. However, it is often not as easy as it sounds. For example, some phishers employ easily overlooked domain-spoofing tricks such as replacing the lowercase letter L with the number 1, or the uppercase letter O with the number 0. Still, most experienced users do not get fooled by phishing sites, so this is not a big problem for them.

Novice users, on the other hand, need all the help they can get. They tend to assume that everything they see on the Web is legitimate and trustworthy, and even if they're aware that scam sites exist, they do not know how to check for telltale phishing signs. To help these users, Internet Explorer 7 comes with a new tool called the Phishing Filter. This filter alerts you to potential phishing scams by doing two things each time you visit a site:

  • Analyzing the site content to look for known phishing techniques (that is, to see if the site is phishy). The most common of these is a check for domain spoofing. This is a common scam that also goes by the names homograph spoofing and the lookalike attack. Internet Explorer 7 also supports International Domain Names (IDN), which refers to domain names written in languages other than English, and it checks for IDN spoofing, domain name ambiguities in the user's chosen browser language.

  • Checking to see if the site is listed in a global database of known phishing sites. This database is maintained by a network of providers such as Cyota, Inc. and Internet Identity and MarkMonitor, as well as by reports from users who come upon phishing sites while surfing. According to Microsoft, this "URL reputation service" is updated several times an hour with new data.

Internet Explorer's Phishing Filter is an opt-in tool because not all users need a helping hand when it comes to avoiding phishing scams. You have to activate it yourself, but that's not hard because as soon as you navigate to your first website in Internet Explorer 7, the Microsoft Phishing Filter dialog box appears. If you want to use the Phishing Filter, leave the Turn On Automatic Phishing Filter option activated and click OK. Internet Explorer 7 immediately asks whether you want to turn on the Phishing Filter.

Note

If you turn off the automatic Phishing Filter checks, you can still check for phishing site by site. After you navigate to a site that you want to check, select Tools, Phishing Filter, Check This Website.

Here's how the Phishing Filter works:
  • If you come upon a site that Internet Explorer knows is a phishing scam, it changes the background color of the Address bar to red and displays a "Phishing Website" message in the Security Report area. It also blocks navigation to the site by displaying a separate page that tells you the site is a known phishing scam. A link is provided to navigate to the site, if you so choose.

    Note

    The Security Report area is another Internet Explorer 7 security innovation. Clicking whatever text or icon appears in this area produces a report on the security of the site. For example, if you navigate to a secure site, you see the lock icon in this area. Click the lock to see a report that shows the site's digital certificate information.

  • If you come upon a site that Internet Explorer thinks is a potential phishing scam, it changes the background color of the Address bar to yellow and displays a "Suspicious Website" message in the Security Report area. If Internet Explorer 7 detects a known phishing site, it displays "Phishing Website" in the Security Report area and blocks access to the site.

Click the "Suspicious Website" text, and Internet Explorer displays the security report. If you're sure this is a scam site, be sure to report it to help improve the database of phishing sites and prevent others from giving up sensitive data. To report a site, either clicking the Report link in the security report or select Tools, Phishing Filter, Report This Website. This opens the Phishing Filter Feedback page.

Easier Add-On Management

Internet Explorer 7 gives you a much better interface for managing all your browser addons, including ActiveX controls, toolbars, helper objects, and more. Select Tools, Manage Add-Ons to display the Manage Add-Ons dialog box.. You can enable and disable add-ons, delete ActiveX control, and more. Use the Manage Add-Ons dialog box to view, enable, disable, and delete Internet Explorer add-ons.

Deleting Browser History

Internet Explorer 7 makes it much easier to delete your browsing history. In previous versions, you had to make separate deletions for cache files, cookies, visited URLs, saved form data, and saved passwords. In Internet Explorer 7, you select Tools, Delete Browsing History to display the Delete Browsing History dialog box.. From here, you can delete the browser history by category, or you can click Delete All to erase everything in one shot. Use the Delete Browsing History dialog box to delete some or all of your Internet Explorer 7 browsing history.

Related Articles

1. How to Configure Automatic Updates in Windows XP
Automatic Updates is a mechanism with an awkwardly plural-sounding name ...

2. MS DOS Versus PC DOS
With modern PCs having a very high level of standardization and compatib...

3. How to make your PC Available for Remote Desktop Connection
To use Remote Desktop to reach your computer from the Internet, both the...

4. How to Update DirectX Advantages
Although most Windows applications place fairly low demands on the displ...


All articles in this directory are property of their respective authors.
Contact us | Terms of Service | Privacy Policy

© 2012 E-articles.info - All Rights Reserved.