Microsoft gets hacker feedback on IE Version 7 Beta 2
It sought advice at the Hack in the Box Security Conference
IDG News Service - Microsoft Corp. showed off the preliminary work it has done on the second beta version of its popular Internet Explorer Version 7 at the Hack in the Box Security Conference in Kuala Lumpur, Malaysia, and came away with good feedback, company officials said today.
"It's the first time we've ever come out ahead of a product release to present and get feedback," said Tony Chor, group program manager for Microsoft's Internet Explorer team, referring to the company's presentation to a hacker-specific group.
Chor and colleague Andrew Cushman, director of Microsoft's security engineering and communications group, spoke highly of the feedback they heard at the presentation and preferred to use the term security research community instead of hackers when referring to attendees.
"Hacker has a negative connotation, like a criminal," said Cushman. People such as attendees of the Hack in the Box conference approach security from a very different, very valuable perspective, he said. "This community is a good source of information, and we haven't availed ourselves of that source," Cushman added.
Chor went a step further, saying Microsoft has maintained an "adversarial" relationship with the hacking community in the past, but "that wasn't working. It just made them mad, and we didn't benefit from their passion and expertise."
The company is working to engage the "security research community" in the future by making presentations at more hacker conventions and giving attendees a chance to critique some of Microsoft's work ahead of releases.
Chor and Cushman handed out business cards liberally, and they said they hope to get more e-mail responses from people as well as notes on their blog. "People had a lot of good suggestions and asked a lot of good questions," said Chor.
Some hackers at the show gave Microsoft high marks for showing off some new security features on the Web browser and seeking their views. They added that they would have liked to hear more technical details on new features in the browser. But their impression was that the presenters appeared almost apologetic, and they said that they don't plan to switch to any Microsoft products in the near term at the expense of, say, Mozilla Corp.'s Firefox browser.
Chor said he plans to increase the amount of technical details in future presentations.
The Beta 2 version of Internet Explorer Version 7, currently under construction at Microsoft, will likely be ready by the end of the year, said Chor.
One new feature in the Web browser is that it runs in higher security "protected mode" by default, set at a lower user privilege. In protected mode,all downloads and other packages are automatically dropped in the "temporary Internet files" folder, so malware can't be deposited on the hard disk. In the temporary folder, IE and Windows treat the files as dangerous, and they're given no privileges to move about.
With add-ons like a Google Inc. toolbar or ActiveX, Internet Explorer Version 7 Beta 2 will offer more permission prompts, since downloads such as ActiveX opt-ins can be an avenue for attack, Chor said. Microsoft also plans to license its "protected mode" innovation to other developers for free to help spread its use, said Chor.
For businesses, Microsoft added a "compatibility mode" that works when a person is using a company's intranet. It allows them to drop files wherever they want to on their PCs.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!