Google to send detailed information about hacked Web sites
- 14 October, 2009 02:50
In an effort to promote the "general health of the Web," Google will send Webmasters snippets of malicious code in the hopes infected Web sites can be cleaned up faster.
The new information will appear as part of Google's Webmaster Tools, a suite of tools that provide data about a Web site, such as site visits.
Google already e-mails administrators if its automated scanners detect malicious content on a site. Those pages are then marked in Google's search results with a warning.
Increasingly, cybercriminals seek to hack legitimate Web pages and plant malicious software since it may be a long time before those sites are cleaned up or detected as opposed to a newly created domain. Unfortunately for administrators, there also may be a significant gap in time between when the site is hacked and when they find out their Web site has been placed on a blacklist.
"We understand the frustration of Webmasters whose sites have been compromised without their knowledge and who discover that their site has been flagged," wrote Lucas Ballard on Google's online security blog.
To Webmasters who are registered with Google, the company will send them an e-mail notifying them of suspicious content along with a list of the affected pages. They'll also be able to see part of the malicious code.
When the Web site is clean, administrators can e-mail Google, and their site will be given the all clear.
"We hope you never have cause to use this feature, but if you do, it should help you quickly purge malware from your site and help protect its visitors," Ballard wrote. "We plan to improve our algorithms in the upcoming months to provide even greater coverage, more accurate vulnerability identification and faster delivery to Webmasters."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
A Holistic Approach to your BYOD Challenge
More and more enterprises are seeing significant benefits from allowing employees to choose the device they use to get their jobs done, and are adopting bring your own device (BYOD) initiatives. While the BYOD trend increases flexibility and productivity, it introduces a host of new challenges for your IT administrators. Click for more!
Leading Through Connections – Insights from the Global Chief Executive Officer Study
IBM’s 2012 Global CEO study follows face-to-face discussions with more than 1,700 CEOs and senior public sector leaders from around the globe. The findings examine how CEOs are responding to the complexity of increasingly interconnected organisations, markets, societies and governments. For example, almost one-quarter of CEOs say their organisations operate below par in terms of driving value from data. CEOs have expressed frustration about their inability to capitalise on available information. This is because: “The time available to capture, interpret and act on information is getting shorter and shorter.” CEO, Chemicals and Petroleum, United States Given the need for deeper business insight, the best performing organisations are more adept at converting complex data into insights, and insights into action. Download Entire Report Now.