According to Symantec, 'Google's influence and speed of search are also a major factor that makes it a target for cybercrime.' Symatec is a software company that provides security, storage and system management solutions.
According to Symantec's report, search results of search giant Google were attacked through links to fake antivirus software, which is a headache for Internet users. However, this is an effective way for attackers on the network to infiltrate and affect users' computers.
Based on Symantec's report about " Rogue Security Software ", the culprit of these 'poisoned' search results is usually scam guys, using search engine techniques to poison search results. Search and bring scam sites to top positions in search results A fake security software program is an application that seems to be a legitimate security software, but will protect very little or In no case, it will also support the installation of fake codes.
Symantec looked at the search results and the search results data appeared in the first hourly positions and considered how many results were fake (out of the first 70 search results of Google). Among Google search results from March to April 2010, Symantec obtained the following numbers:
• In a particular hour, out of the first 70 search results, 3 out of 10 search results contain at least one fake URL.
• On average, every 15 links out of 70 search results are fake and have been poisoned (ie at least one fake URL).
• Average for a specific day, out of the first 70 search results, 7.3% of links are fake.
• Of the 70 search results, 68% of the links to fake websites are the most contaminated.
• Most fake URLs will send users to fake antivirus sites.
It is clear that attackers will continue to succeed in poisoning search results. They have a structure that can automatically collect the latest and most familiar search results, then poison these results.
Symantec offers advice to Internet users to be careful with every click on the search results links, especially if searching for familiar or popular topics. The company also recommends that users should visit the company's Twitter address to find the latest information on Internet threats.
recently, ngoc chanh with the nickname killer with a vietnamese hacker was honored by google at the hall of fame, a ranking of experts who have contributed greatly in finding and uncovering security gaps of the technology giant. .
have you ever imagined yourself in the role of a hacker? one way to do that is through a hacking emulator. through these emulators, you can experience the scenarios and challenges that a hacker faces today.
one fine day, you take your bike to the street, plan a few laps to relax your mind, don't forget to turn on the location tracking feature on your phone to see how far you are, and then suddenly you're in trouble. with the law. this is exactly what this unlucky man encountered.
the cover image of facebook hacker will help you have more motivation to continue learning to become a hacker. in this article, software tips will send you the most beautiful and varied facebook hacker cover images in many different ways.
after shaking hands with the government to uncover the world's leading hacker organization, he has a long journey full of sweat and tears fleeing his past.
raidforum, one of the largest black hat hacker forums where hackers buy and sell data, has had its domain name seized and has been inaccessible since late february.
according to the sans security research center, some images on google have been infected by malicious code, which leads users to websites that sell fake antivirus software or make users believe they have to download a program. certain (is a hacker's fake product) to fight viruses.
in computer security, a hacker is someone who focuses on the security mechanisms of computer systems and networks. there are communities and shared cultures between geeks and cyber wizards that trace back decades to the first moments of data sharing experiments between the minicomputer and the arpanet. members of this community were the first 'hackers'. hacking into computers and phone systems has become iconic among hackers, but this culture is more complex and ethical than many people think. learn basic hacking techniques, the hacker mindset, and gain respect to break into the hacker world.