{"id":18066,"date":"2022-02-02T10:48:49","date_gmt":"2022-02-02T18:48:49","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11799\/"},"modified":"2022-02-02T10:48:49","modified_gmt":"2022-02-02T18:48:49","slug":"news-11799","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11799\/","title":{"rendered":"Microsoft beefs up Edge&#039;s security against zero-day attacks"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2021\/11\/26\/20\/keyboard_laptop_microsoft-edge-logo_web-browser_by-urupong-getty-images-1200x800-100816809-large.3x2-100912436-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Lucas Mearian| Date: Thu, 20 Jan 2022 13:16:00 -0800<\/strong><\/p>\n<p>In the latest release of its Edge beta, Microsoft introduced a new way for IT admins to better secure the Chromium-based browser against web-based attacks.<\/p>\n<p>The <a href=\"https:\/\/docs.microsoft.com\/en-us\/deployedge\/microsoft-edge-relnote-beta-channel#version-980110823-january-14\" rel=\"nofollow noopener\" target=\"_blank\">release notes for Microsoft Edge Beta Channel<\/a> describe the new security features as employing several techniques to guard against so-called zero-day exploits; Zero-day exploits are software or network vulnerabilities developers are unaware of, and so they\u2019ve not been patched.<\/p>\n<p>Imagine if the keylock mechanism on your home\u2019s backdoor was faulty and jiggling the doorknob released the latch. Burglars could walk door to door looking for that particular vulnerability and jiggle doorknobs until one opened. Zero days are the same concept, but in cyberspace.<\/p>\n<p>IT systems are increasingly coming under assault by new viruses, cyberwarfare, and brute-force attacks. One of the easier avenues into an organization\u2019s systems is through an unknown, and unpatched, vulnerability \u2014 especially one outside an organization\u2019s firewalls (i.e., an end-user\u2019s device). The obvious problem with zero-day exploits is they&#8217;re hard to catch when developers and security admins don&#8217;t know what to look for, according to\u00a0Jack Gold, principal analyst at J. Gold Associates.<\/p>\n<p>Hackers \u2014 both good and bad actors \u2014 sell zero-day exploits they discover. The good guys sell them to corporations to bolster their security; the bad guys sell them to other bad actors. For example, at the beginning of the pandemic, <a href=\"https:\/\/www.tripwire.com\/state-of-security\/featured\/zoom-zero-day-exploit-sale-500000\/\" rel=\"nofollow noopener\" target=\"_blank\">hackers sold software vulnerabilities discovered in the video conferencing app Zoom<\/a>; one exploit was for Windows PCs, the other, for macOS systems. The hackers allegedly saw a half million-dollar payday.<\/p>\n<p>Microsoft\u2019s new Edge feature enables admins to configure certain Group Policies for end-user desktops (Windows, macOS, and Linux) to help protect against zero-day vulnerabilities. When turned on, the feature adds Hardware-enforced <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-kernel-internals-blog\/understanding-hardware-enforced-stack-protection\/ba-p\/1247815\" rel=\"nofollow noopener\" target=\"_blank\">Stack Protection<\/a>, <a href=\"https:\/\/blogs.windows.com\/msedgedev\/2017\/02\/23\/mitigating-arbitrary-native-code-execution\/\" rel=\"nofollow noopener\" target=\"_blank\">Arbitrary Code Guard<\/a> (ACG), and <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard\" rel=\"nofollow noopener\" target=\"_blank\">Content Flow Guard<\/a> (CFG) as supporting security mitigations to better protect users online. The group policies include: EnhanceSecurityMode; EnhanceSecurityModeBypassListDomains; and EnhanceSecurityModeEnforceListDomains.<\/p>\n<p>&#8220;So the safest way to protect browsing is to prevent the browser from interacting with any other parts of the machine,&#8221; Gold said. &#8220;Basically, the safest way to do this is to put the browser in a &#8216;vault&#8217; where all the browser code remains locked into a virtual section of the machine and can\u2019t go anywhere else. It\u2019s basically a containment policy. What Microsoft is trying to do with the new Edge features is to make sure that anything in the browser can\u2019t interact with over apps and\/or modify the OS.&#8221;<\/p>\n<p>Stack protection and arbitrary code guard, Gold explained, prevent any zero-day exploits that would have a way to exit from the browser into the machine. Content follow is similar in that it prevents interacting with and taking over apps (e..g, opening an infected doc in Word).<\/p>\n<p>&#8220;So, it is this a big deal,&#8221; Gold said. &#8220;There are many examples of machines being infected with malware from browsing the wrong site. Anything that can prevent this from happening is good.&#8221;<\/p>\n<p>Conversely, setting policies also means that some sites that legitimately need to access other apps on an end-user&#8217;s device, and\/or access parts of the OS, will not be able to, Gold said. While that may be fine for casual internet browsing, the biggest challenge is that, if set this way, some internal browser-based apps may not run (e.g., pop up screens to fill in info or get a status).<\/p>\n<p>&#8220;So, as with any security technology, there are pros and cons to shutting down specific features. But the potential damage of a zero-day getting into my machine, and then into the networks is a good reason to cause a bit of inconvenience,&#8221; Gold said.<\/p>\n<p>There are already other third-party browser implementations that have done a similar \u201crun in isolation\u201d feature for a while now; Edge is now catching up, Gold said.<\/p>\n<p>The update to the Edge beta also introduces a custom primary password feature. While the browser already allows \u00a0users to add an authentication step before saved passwords are auto-filled in web forms (in other words, two-factor authentication), being able to create a custom password adds yet another layer of privacy and helps prevent unauthorized users from using saved passwords to logon to websites.<\/p>\n<p>Custom primary password is an evolution of that same feature, where users can now use a custom string of their choice as their primary password. After it&#8217;s enabled, users will enter this password to authenticate themselves and have their saved passwords auto-filled into web forms.<\/p>\n<p>Along with the new security features, <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/discussions\/dev-channel-update-to-99-0-1135-5-is-live\/m-p\/3066199\" rel=\"nofollow noopener\" target=\"_blank\">other improvements<\/a> include a fix for an issue where default search providers can&#8217;t be removed, a small tweak to show search suggestions immediately when you click on the address bar, and the addition of Web Capture when viewing PDFs in Microsoft Edge.<\/p>\n<p>Finally, Microsoft has updated its scrollbars with an overlay-based design in Edge. Users can turn this feature on in edge:\/\/flags.<\/p>\n<p>Enabling this feature hides the toolbar, and prevents your scrollbar from appearing, requiring a user to hover the mouse over the edge of your window to trigger the scrollbar to appear.<\/p>\n<p>Disabling it will make the toolbar automatically appear.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3648068\/microsoft-beefs-up-edges-security-against-zero-day-attacks.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2021\/11\/26\/20\/keyboard_laptop_microsoft-edge-logo_web-browser_by-urupong-getty-images-1200x800-100816809-large.3x2-100912436-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Lucas Mearian| Date: Thu, 20 Jan 2022 13:16:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>In the latest release of its Edge beta, Microsoft introduced a new way for IT admins to better secure the Chromium-based browser against web-based attacks.<\/p>\n<p>The <a href=\"https:\/\/docs.microsoft.com\/en-us\/deployedge\/microsoft-edge-relnote-beta-channel#version-980110823-january-14\" rel=\"nofollow noopener\" target=\"_blank\">release notes for Microsoft Edge Beta Channel<\/a> describe the new security features as employing several techniques to guard against so-called zero-day exploits; Zero-day exploits are software or network vulnerabilities developers are unaware of, and so they\u2019ve not been patched.<\/p>\n<p>Imagine if the keylock mechanism on your home\u2019s backdoor was faulty and jiggling the doorknob released the latch. Burglars could walk door to door looking for that particular vulnerability and jiggle doorknobs until one opened. Zero days are the same concept, but in cyberspace.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3648068\/microsoft-beefs-up-edges-security-against-zero-day-attacks.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10700,714],"class_list":["post-18066","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-edge","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18066"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18066\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18066"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}