Surf, using VirtualBox and sign in to a Virtual machine.
Using a Virtual Machine (VM), whether VirtualBoz, VMware, or something else, is a great approach. Its important, though to limit the resources that the VM can touch external hard drives, VM host directories, etc. so that if the VM does get hit, the malware only destroys the VM itself.