Google to send detailed information about hacked Web sites
- 14 October, 2009 02:50
In an effort to promote the "general health of the Web," Google will send Webmasters snippets of malicious code in the hopes infected Web sites can be cleaned up faster.
The new information will appear as part of Google's Webmaster Tools, a suite of tools that provide data about a Web site, such as site visits.
Google already e-mails administrators if its automated scanners detect malicious content on a site. Those pages are then marked in Google's search results with a warning.
Increasingly, cybercriminals seek to hack legitimate Web pages and plant malicious software since it may be a long time before those sites are cleaned up or detected as opposed to a newly created domain. Unfortunately for administrators, there also may be a significant gap in time between when the site is hacked and when they find out their Web site has been placed on a blacklist.
"We understand the frustration of Webmasters whose sites have been compromised without their knowledge and who discover that their site has been flagged," wrote Lucas Ballard on Google's online security blog.
To Webmasters who are registered with Google, the company will send them an e-mail notifying them of suspicious content along with a list of the affected pages. They'll also be able to see part of the malicious code.
When the Web site is clean, administrators can e-mail Google, and their site will be given the all clear.
"We hope you never have cause to use this feature, but if you do, it should help you quickly purge malware from your site and help protect its visitors," Ballard wrote. "We plan to improve our algorithms in the upcoming months to provide even greater coverage, more accurate vulnerability identification and faster delivery to Webmasters."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
MAM Evaluation Guide: 10 Must Haves
Your employees demand more apps, more data, more convenience—which places a major strain on IT. Satisfy both sides with a Mobile App Management (MAM) solution. Here’s a guide to help you understand the critical success factors before getting started.
Best Practices in Data Protection Monitoring
This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.
Ensuring Online Business in Asia-Pacific
In an increasingly connected world, your company’s online presence is often the first - and sometimes the only – way that your customers and clients engage with you. In this whitepaper, we look at how companies can leverage the right technology and service to deliver a secure network infrastructure - from internal communication and record-keeping to product design and financial management.