Google to send detailed information about hacked Web sites
- 14 October, 2009 02:50
In an effort to promote the "general health of the Web," Google will send Webmasters snippets of malicious code in the hopes infected Web sites can be cleaned up faster.
The new information will appear as part of Google's Webmaster Tools, a suite of tools that provide data about a Web site, such as site visits.
Google already e-mails administrators if its automated scanners detect malicious content on a site. Those pages are then marked in Google's search results with a warning.
Increasingly, cybercriminals seek to hack legitimate Web pages and plant malicious software since it may be a long time before those sites are cleaned up or detected as opposed to a newly created domain. Unfortunately for administrators, there also may be a significant gap in time between when the site is hacked and when they find out their Web site has been placed on a blacklist.
"We understand the frustration of Webmasters whose sites have been compromised without their knowledge and who discover that their site has been flagged," wrote Lucas Ballard on Google's online security blog.
To Webmasters who are registered with Google, the company will send them an e-mail notifying them of suspicious content along with a list of the affected pages. They'll also be able to see part of the malicious code.
When the Web site is clean, administrators can e-mail Google, and their site will be given the all clear.
"We hope you never have cause to use this feature, but if you do, it should help you quickly purge malware from your site and help protect its visitors," Ballard wrote. "We plan to improve our algorithms in the upcoming months to provide even greater coverage, more accurate vulnerability identification and faster delivery to Webmasters."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why IT projects really fail
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
CIO 100: Carsales wins top gong for innovation
How to secure passwords and other critical numbers
Introduction to Storage efficiency technologies
Data is growing at a tremendous rate, and organisations of every type rely on the timely retrieval of information to facilitate transaction and decision making. Processing powers are also expanding, now equipped with storage efficiency technologies that help simplify the many IT challenges that companies are facing. This white paper describes how proper simple storage efficiency features help you leverage daily storage, maximise capacity and performance optimisation, while reducing power consumption and total cost.
Top 10 tips for Migration
As users bring multiple devices to the workplace, IT departments need to have a single view of all their mobile devices. Find out how to build a secure and reliable management platform for next generation mobile computing across multiple platforms. Click for more!
Enterprise Mobility Management: Embracing BYOD Through Secure App and Data Delivery
The first response of many IT organisations to the influx of consumer-grade and employee-owned mobile devices has been to lock down and control every mobile device in the enterprise through mobile device management (MDM) solutions. Yet, the transformation of computing through mobility, consumerisation, bring-your-own device (BYOD) and flex-work offers powerful benefits for today’s organisations - but it poses significant challenges for IT. Download now to find out what is the best approach for mobility management.