[IS&T Security-FYI] SFYI Newsletter, February 6, 2009

Monique Yeaton myeaton at MIT.EDU
Fri Feb 6 12:57:22 EST 2009


In this issue:

1. Security Features in IE8
2. Is My Computer Infected With a Virus?


---------------------------------
1. Security Features in IE8
---------------------------------

In its advertising, Microsoft is claiming the next version of Internet  
Explorer (now still in Beta) is "faster, safer & easier than ever." So  
what is so safe about IE8 compared to its earlier versions?

IE8 provides security through a robust new architecture. IE8's  
security features help defend against malicious software (malware),  
and better protect against the theft of personal data through  
fraudulent web sites, a practice known as phishing.

Security features in IE8 include:

  * InPrivate Browsing & Filtering *
IE8 provides InPrivate Browsing that won't record any information,  
including searches or webpage visits. The InPrivate Filtering feature  
is similar, in that it provides users with an added level of control  
and choice about the information that third party websites can  
potentially use to track browsing activity.

* SmartScreen Filter *
With the SmartScreen filter active, if you attempt to visit a website  
that isn't considered safe, a screen with a warning will appear  
prompting you to take alternative actions. It will also notify you  
when you attempt to download software that is potentially unsafe

  * Cross Site Scripting (XSS) Filter *
Internet Explorer 8 can detect malicious code running on compromised  
websites, helping to protect you from exploits which can lead to  
information disclosure, cookie stealing, account/identity theft, and  
more.

  * Domain Highlighting *
Domain Highlighting lets you more easily interpret web addresses  
(URLs) to help you avoid deceptive and phishing sites that attempt to  
trick you with misleading addresses. It does this by highlighting the  
domain name in the address bar in black, with the remainder of the URL  
string in gray, making for easier identification of the sites true  
identity.

  * Data Execution Detection (DEP) *
Data Execution Prevention (DEP), on by default in Internet Explorer 8  
in Windows Vista Service Pack 1, is a security feature that can help  
prevent damage to your computer from viruses and other security  
threats by preventing certain types of code from writing to executable  
memory space.

To learn more: <http://www.microsoft.com/windows/internet-explorer/beta/features/overview.aspx?tabid=1&catid=1 
 >


----------------------------------------------------
2. Is My Computer Infected With a Virus?
----------------------------------------------------

You might not realize that you have introduced a virus until you  
notice something isn't quite right. Here are some signs that your  
computer might be infected:

  * Your computer runs more slowly than normal
  * Your computer stops responding or locks up often
  * Your computer crashes and restarts every few minutes
  * Your computer restarts on its own and then fails to run normally
  * Applications on your computer don't work correctly
  * Disks or disk drives are inaccessible
  * You can't print normally
  * You see unusual error messages
  * You see distorted menus and dialog boxes

These are common symptoms of infection -- but they might also indicate  
hardware or software problems that have nothing to do with a virus.

What can you do to help the technician assisting you with your problem  
to determine the cause?

  * Do not ignore the symptoms. Write them down, especially the text  
of any unusual error messages.
  * Look for a pattern, and make a note of it.  For example, are all  
of your applications affected?  Is the problem only with printing?   
When does your system crash?
  * Contact your network administrator (computer help desk) or your  
Internet Service Provider, or call the technical support number  
provided by the manufacturer of your system.
  * Answer the technician's questions carefully, and describe the  
problem in as much detail possible. The more useful information you  
can provide, the quicker the problem will be resolved.
  * The technician may advise you to stop using your computer. If so,  
follow that advice. Short-term inconvenience is better than losing all  
your data or having your identity stolen.



=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security



-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.mit.edu/pipermail/ist-security-fyi/attachments/20090206/e7b3d9aa/attachment.htm


More information about the ist-security-fyi mailing list