Strength Google gets viruses exploited to spread

"Google Hacking" book cover by Jonny Long.
Authors of attack software are increasingly creating new tools to take advantage of the massive search system to determine the target. This is the latest trend in the hacker world and is called 'Google hacking' technology.
'Google hacking' does not mean entering the service company's servers, but online criminals use search systems to collect information online.This technique has even been written into books.
According to deputy director of risk management George Kutz of security firm McAfee, the virus called Santy, which appeared at the end of 2004, exploited a vulnerability that was published in some phpBB versions, so that hackers can do it. deformation (deface) websites.The virus detects the target via an automated search command on Google.The search engine later blocked Santy's spread by blocking all search commands that appeared on servers running the application.However, Google's system can only detect exploits if the query commands reveal differences compared to other search commands.
Hackers used search engines to support website intrusions since the search service was launched on the Internet.McAfee deputy director George Kutz said that only a few simple queries could be obtained by user names and sensitive personal information.Some Internet users also put log files for scanning errors on their websites and reports of this activity are an invitation to online criminals to exploit the recorded vulnerabilities.
You should read it
- Search for what when Google 'sudden death'?
- How to delete search browsing history in Google Chrome?
- Google improves Search to provide more in-depth results for questions
- Once the youngest employee in Google, this girl has just revealed a search engine that will cause Google to worry
- Interesting search engines on Google that you may not know yet
- Google Search Android encounters strange errors, automatically escaping when users search for these keyword phrases
- Google announced a major change in search functionality
- Private search engines replace Google
May be interested
- Detecting malicious viruses in the application has more than 100 million downloadsthe google play store removed the camscanner pdf application running android operating system by cc intelligence corporation in china after discovering that it recently spread a malicious virus.
- Fake courier service to spread viruseshacker hides e-mail carriers to trick users. there have been 7,500 computers in vietnam infected with this virus.
- Viruses spread quickly through MSN Messengera trojan is being spread indirectly via msn messenger messaging software, causing thousands of affected computers along with an increase in the number of malware-infected systems.
- Detecting computer viruses spread ... ISS space stationthe us aeronautics agency (nasa) has confirmed that a laptop brought to iss in july was infected with a virus called gammima.ag.
- 10 security holes exploited by hackers in 2018microsoft accounted for 8 of the top 10 vulnerabilities that were exploited by hackers in 2018.
- Storm took advantage of the US national flag to spreadtrue to the predictions of computer security vendors that are extremely dangerous storm has returned to the right on july 4 - the us national day.
- How do viruses and worms spread on email?here are two examples to help you understand how email viruses work, based on symantec's information.
- Add a virus spread through Yahoo! IMafternoon 1-8, a virus named vloveym has spread to a series of computers in vietnam. according to the analysis of the network security center (bkav), this virus appeared on july 28. just like the previous gaixinh (xrobot) and ymheart viruses, vloveym is mainly in
- Why can't Google Drive scan this file for viruses? How to fix?is google drive unable to scan this file for viruses? is this a situation that is making it difficult for you to experience this browser?
- Hacker exploited three vulnerabilities in Microsoft Office to spread Zyklon malwaresecurity researchers have discovered a botnet spread of malware through at least three new vulnerabilities published in microsoft office.