Microsoft is using data-mining techniques from a third party in its Internet browsers to guard against “phishing” attacks, where suspicious websites try to harvest personal information from unknowing victims.Digital Resolve, of Norcross, Ga., announced Tuesday that Microsoft is licensing data that comes from its Trusted Server technology, which crawls the Internet and builds lists of websites and their legitimate IP addresses.The data will be used by the antiphishing filter in Microsoft’s Internet Explorer versions 6 and 7 in addition to Windows Live Toolbar, a browser search box, Digital Resolve said.The technology focuses heavily on the websites of financial companies and e-commerce sites. It looks at 39 characteristics of a website, including IP address, location, domain and the ISP, said Dennis Maicon, Digital Resolve’s vice president for financial services solutions. It also checks how long a particular domain is valid based on its registration information. “When somebody goes to type in Barclays.com, it’s able to then take that URL, resolve it to an IP address, and then check against a list to see if it is an authorized Barclays server,” Maicon said.The company says its technology takes the opposite approach of so-called “blacklists,” which are lists of reported phishing sites, said Susan Daw, Digital Resolve’s director of marketing. Keeping updated blacklists can be difficult as phishing sites may be active for only a short time, Daw said. Rather than comparing a URL to a list of bad sites, Digital Resolve’s technology lets the phishing filter know which sites are good, Daw said. Microsoft is using a combination of technologies for the phishing filter, including blacklists.Daw said the technology is 100 percent successful for websites it has indexed. However, it’s the first time the technology has been deployed, she said.For suspicious websites, such as a bank site with an irregular URL, the phishing filter triggers a warning to the user to either continue viewing the site or close the webpage.Digital Resolve said the technology can guard against “man-in-the-middle” style attacks, where an attacker collects a victim’s log-in and password before passing the person to the legitimate site. Those attacks are often mounted from an irregular IP address that can be checked, according to Digital Resolve.-Jeremy Kirk, IDG News Service (London Bureau)This article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in. Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe