"a web page link that directly leads to a download that delivers a malicious payload whose content type would lead to execution, or more generally a website known to host malware links."
This differs from exploit-based, drive-by attacks and according to the report is the predominant internet threat at this time. The report is careful to point out that it does not evaluate the overall security of the browser or add-ons/extensions in terms of vulnerabilities.
Their findings indicate IE9 blocks 92% of this category of malware.
So, what does it really mean. It means simply this, the largest percentage of malware problems today are coming from this kind of attack and Internet Explorer 9 is the best at preventing this form of attack.
I believe IE9 still has some significant overall security challenges but I wanted to post the link to this report and briefly discuss it because it is significant that, without add-ons, IE9 is reportedly doing a very good job blocking this class of malware delivery.
IE9 uses two techniques to attain this protection.
- SmartScreen URL Filter (which is in IE8 as well)
- SmartScreen Application Reputation (new to IE9)
You can read more about this and other security technology built into IE 9 here.
I've given it some more thought on how I recommend browsers and talk about browsing security to family, friends and co-workers given this report. It's an interesting report and to me, shines new light on IE9 as well as how users are actually compromised. My own browsing protection strategy has been crafter to protect more against the so-called "drive-by" exploit, java and javascript exploits and click-jacking. Perhaps that is from working in the Security field and being cautious about what links I follow and the email I receive.
I am not ready to say dump Firefox with security add-ons yet but I am using this as a catalyst to investigate and research browser security even further. I know this is a pretty simplistic analysis at this moment but my hope is that it will serve for both myself and the reader as a point of departure for a closer look at the browser security and just what that means.
-tm
>


