New Internet Explorer 7 Security Features

As more people, businesses, and organizations establish a presence online, the world becomes an increasingly connected place. And the more connected the world becomes, the more opportunities arise for communicating with others, doing research, sharing information, and collaborating on projects.

The flip side to this new connectedness is the increased risk of connecting with a remote user whose intentions are less than honorable. It could be a fraud artist who sets up a legitimate-looking website to steal your password or credit card number, a virus programmer who sends a Trojan horse attached to a program download, or a website operator who uses web browser security holes to run malicious code on your machine.

Admittedly, online security threats are relatively rare and are no reason to swear off the online world. However, these threats do exist and people fall victim to them every day. Luckily, protecting yourself from these and other e-menaces doesn't take much effort or time, particularly with the new security features built into Internet Explorer 7.

Protected Mode: Reducing Internet Explorer's Privileges

Windows Vista's antispyware initiatives aren't restricted to Windows Defender. Because spyware often leeches onto a system through a drive-by or pop-up download, it makes sense to set up the web browser as the first line of defense. Microsoft has done just that by introducing Protected mode for Internet Explorer.

Internet Explorer's Protected mode means that IE runs with a privilege level that's enough to surf the Web, but that's about it. Internet Explorer can't install software, modify the user's files or settings, add shortcuts to the Startup folder, or even change its own settings for the default home page and search engine.

The Internet Explorer code is completely isolated from any other running application or process on your system. In fact, Internet Explorer can write data only to the Temporary Internet Files folder. If it needs to write elsewhere (during a file download, for example), it must get your permission. So any add-ons or other malware that attempt a covert install via Internet Explorer will be blocked before they can even get to Windows Defender.

Note

If you don't want to run Internet Explorer 7 in Protected mode, for some reason, you can turn it off. Select Tools, Internet Options, and then select the Security tab. Remove the checkmark from the Enable Protected Mode check box to deactivate it, and then click OK. Internet Explorer displays a message in the Information bar telling you that your security settings are putting you at risk.

You can reactivate the Protected mode setting by clicking the Information bar and then clicking Fix Settings For Me. Otherwise, restart Internet Explorer to put the new setting into effect. Internet Explorer, ever persistent, will display a local SecurityRisk page that warns you about your security settings. Click the Home button to continue browsing.

Total Security: Internet Explorer Without Add-Ons

For the ultimate in browsing security, Windows Vista ships with an alternative Internet Explorer shortcut that loads the browser without any third-party add-ons, extensions, toolbars, or ActiveX controls. Select Start, All Programs, Accessories, System Tools, Internet Explorer (No Add-Ons). Internet Explorer starts and displays the Add-Ons Disabled page.

Thwarting Phishers with the Phishing Filter

Phishing refers to creating a replica of an existing web page to fool a user into submitting personal, financial, or password data. The term comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data.

The most common ploy is to copy the web page code from a major sitesuch as AOL or eBayand use that code to set up a replica page that appears to be part of the company's site. (This is why phishing is also called spoofing.) A fake email is sent out with a link to this page, which solicits the user's credit card data or password. When the form is submitted, it sends the data to the scammer while leaving the user on an actual page from the company's site so he or she doesn't suspect a thing.

A phishing page looks identical to a legitimate page from the company because the phisher has simply copied the underlying source code from the original page. However, no spoof page can be a perfect replica of the original. Here are five things to look for:

  • The URL in the Address bar A legitimate page will have the correct domainsuch as aol.com or ebay.comwhile a spoofed page will have only something similarsuch as aol.whatever.com or blah.com/ebay.
  • The URLs associated with page links Most links on the page probably point to legitimate pages on the original site. However, some links might point to pages on the phisher's site.
  • The form-submittal address Almost all spoof pages contain a form into which you're supposed to type whatever sensitive data the phisher seeks from you. Select View, Source, and look at the value of the form tag's action attribute. This will be the address to which the form will be submitted. If the form data is clearly not being sent to the legitimate domain, you know you're dealing with a phisher.
  • Text or images that aren't associated with the trustworthy site Many phishing sites are housed on free web hosting services. However, many of these services place an advertisement on each page, so look for an ad or other content from the hosting provider.
  • Internet Explorer's lock icon in the status bar and Security Report area A legitimate site would transmit sensitive financial data only using a secure HTTPS connection, which Internet Explorer indicates by placing a lock icon in the status bar and in the Address bar's new Security Report area. If you don't see the lock icon with a page that asks for financial data, the page is almost certainly a spoof.

If you watch for these things, you'll probably never be fooled into giving up sensitive data to a phisher. However, it's often not as easy as it sounds. For example, some phishers employ easily overlooked domain-spoofing tricks such as replacing the lowercase letter L with the number 1, or the uppercase letter O with the number 0. Still, most experienced users don't get fooled by phishing sites, so this isn't a big problem for them.

Novice users, on the other hand, need all the help they can get. They tend to assume that everything they see on the Web is legitimate and trustworthy, and even if they're aware that scam sites exist, they don't know how to check for telltale phishing signs. To help these users, Internet Explorer 7 comes with a new tool called the Phishing Filter. This filter alerts you to potential phishing scams by doing two things each time you visit a site:

  • Analyzing the site content to look for known phishing techniques (that is, to see if the site is phishy). The most common of these is a check for domain spoofing. This is a common scam that also goes by the names homograph spoofing and the lookalike attack. Internet Explorer 7 also supports International Domain Names (IDN), which refers to domain names written in languages other than English, and it checks for IDN spoofing, domain name ambiguities in the user's chosen browser language.
  • Checking to see if the site is listed in a global database of known phishing sites. This database is maintained by a network of providers such as Cyota, Inc. and Internet Identity and MarkMonitor, as well as by reports from users who come upon phishing sites while surfing. According to Microsoft, this "URL reputation service" is updated several times an hour with new data.

Internet Explorer's Phishing Filter is an opt-in tool because not all users need a helping hand when it comes to avoiding phishing scams. You have to activate it yourself, but that's not hard because as soon as you navigate to your first website in Internet Explorer 7, the Microsoft Phishing Filter dialog box appears. If you want to use the Phishing Filter, leave the Turn On Automatic Phishing Filter option activated and click OK.

Here's how the Phishing Filter works:

  • If you come upon a site that Internet Explorer knows is a phishing scam, it changes the background color of the Address bar to red and displays a "Phishing Website" message in the Security Report area. It also blocks navigation to the site by displaying a separate page that tells you the site is a known phishing scam. A link is provided to navigate to the site, if you so choose.
  • If you come upon a site that Internet Explorer thinks is a potential phishing scam, it changes the background color of the Address bar to yellow and displays a "Suspicious Website" message in the Security Report area.

Click the "Suspicious Website" text, and Internet Explorer displays the security report. If you're sure this is a scam site, be sure to report it to help improve the database of phishing sites and prevent others from giving up sensitive data. To report a site, either clicking the Report link in the security report or select Tools, Phishing Filter, Report This Website. This opens the Phishing Filter Feedback page.

Easier Add-On Management

Internet Explorer 7 gives you a much better interface for managing all your browser addons, including ActiveX controls, toolbars, helper objects, and more. Select Tools, Manage Add-Ons to display the Manage Add-Ons dialog box. You can enable and disable add-ons, delete ActiveX control, and more.

Deleting Browser History

Internet Explorer 7 makes it much easier to delete your browsing history. In previous versions, you had to make separate deletions for cache files, cookies, visited URLs, saved form data, and saved passwords. In Internet Explorer 7, you select Tools, Delete Browsing History to display the Delete Browsing History dialog box. From here, you can delete the browser history by category, or you can click Delete All to erase everything in one shot.