Search Engine Poisoning - how to protect from it?
Author: Jurgita Ziuraite
There is more and more ongoing talk about search engine poisoning and how damaging it is to an ordinary computer user. Some say that thousands or even millions of people have fallen victim to it all over the world. For those who are not that well familiar with the term "search engine poisoning"(SEP), it is defined as a mix of wanted results and dodgy sites, such as malware infected websites or payday loan sites.
SEP is a method that malicious spammers use to distribute their malware. They use search engine optimization techniques (SEO) to put infected pages high on search results. Specific keywords that are extremely popular are targeted in order to maximize malicious page hits. It might be that a malicious site will appear higher than a legitimate one on a results page. Most Internet users trust such search providers as Google or Bing and press on the given results without thinking of the possible dangers.
Talking about statistics, a recent announcement of SophosLabs gives us shocking numbers. Bing is the most poisoned search engine, giving more than two thirds (65 per cent) of search results as poisoned. Although Goolge is behind yet the results are not as reassuring as one might expect. 30 per cent of poisoned search results originated from the latter search engine. The most poisoned is image search. 92 per cent of redirects to malicious web sites come from this type of search.
Although search engine specialists fight SEP problem every day it is not that easy. Advanced technology allows spammers programming websites that detect if a visitor is a genuine person or a search engine crawler. For the crawler a fully legitimate website will be displayed. Yet for a genuine user, she will be attacked by malware. Even more, vulnerabilities of popular websites are exploited and scammers inject malicious code to them. This enables visitors to be redirected to the malware-infected pages. Cross-site scripting (XSS) vulnerabilities are being used in most of the cases. Although the above problems are known to such search providers as Google or Bing, the ways of fighting against them are still being searched for.
Meanwhile we are responsible for protecting our technique from malware attacks. Here are some tips that one should follow:
Learn to distinguish between legitimate websites and those that can be labeled as SEP. Such characteristics as suffocating web ads, lots of pop-ups, pages that make you think you already have malware and convince you to install their "antivirus" are a clear sign of malicious sites.
Choose to directly type the URL of notable websites into your browser if you search for a popular topic rather then perform a usual search. Do not rely that much on clicking search engine results especially if you perform an image search.
Keep your computer security (antivirus, antimalware, firewall) always updated.
Turn on your browser's security features. If you get a warning that the page might be suspicious, leave it at once.
Once you saw that you are being redirected to pages you did not intend to visit, check your computer settings. It might be that you need to uninstall unwanted programs or remove a redirect virus
8 Surefire Ways to Spot an E-Mail Identity Theft Scam!
The E-Mail Identity Theft Scam is running Rampant. These E-Mail Scam artists will go to great lengths to Get Your Bank Account information and Steal your Identity.
How to Protect Yourself Against Online Criminals
Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually.
Watching the Watchers: Detection and Removal of Spyware
If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you.
How Spyware Blaster Can Protect Your Computer From Harm
By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today.
How to Protect Your Child from the Internet
When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time.
The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft.
Identity Theft - Dont Blame The Internet
Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.
Protecting Your Home Both Inside and Out
If you are a parent, you have probably wondered at one time or another, what more you can do to protect your children and yourself, not only physically but emotionally, mentally, spiritually etc. Today many parents and families are discouraged.
Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is
A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each.
Online Cell Phone Scams and Spam
They're out there. Individuals trying to make a quick buck at your expense.
How to Thwart the Barbarian Spyware!
Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics.
Arming Yourself Against Spyware
While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware.
What is Microsoft Security Essentials (MSE)? How would you update virus definitions in it?
Microsoft cares best for its users and introduces products and utilities that are extremely helpful for users worldwide. You get Microsoft Security Essentials (MSE) as one of such utilities that is offered free by Microsoft. MSE is a freebie that is designed to guard your PC or laptop from viruses, malware, spyware, rootkits, Trojan horse and other online threats. MSE is a delight for all those who are using home or small business PCs as it provides real time protection to your computer.
Achieve a Higher Level of Security With Your Business
We live in a world that is constantly changing, and it is much different in many ways than it was just a few short decades ago. One of the ways that the world has certainly changed is in the amount of security that we have. This is not only true of our home security but it is also true of the lack of security in the workplace.
How to Repair the Damage Identity Theft Has Caused
Identity theft has been an increasing problem for people all over the world. With the constant advancement of technology, it has become scarily easy for criminals to get your information and use it to their advantage. While for some, particularly those who have taken the relevant precautions, such as identity theft insurance it can be very simple to fix. For others though who are not as lucky in their efforts to repair the damage it can have severe consequences.