Security Risks to Increase with Real-Time Searches
A range of security experts say the crusade by search engines to include "real-time" results from social networking sites will undoubtedly make life easier for hackers. Such word comes hot on the heels of a report suggesting sites like Facebook and Twitter now pose a risk to businesses.
As we reported last week, Google is trying out a new feature which lists results for a search term in real time. That means that for popular topics there's no longer a lengthy waiting period while web pages are scanned and indexed: instead they are constantly monitored and appear in a special results section almost immediately.
As well as looking at news pages, the search engine is now able to get the latest postings from Twitter, with Facebook a likely addition in the future.
Almost 2,500 Infected Websites Per Day
However, a USA Today report says the new technology could have drawbacks.
With almost 2,500 infected websites detected by security firm Symantec each day (and that's just the ones that are found), one of the most common tactics for hackers is tricking people into following bogus links which redirect them to malicious web pages. If the visitor does not have adequate security protection, they may then be vulnerable to viruses which take advantage of unpatched flaws in their browser. (Source: usatoday.com)
Ranked "Now" More Important Than Ranked High
The risk now is that hackers can reach a much larger audience by posting a message on a social networking site and then have it appear on the real-time web search.
To give an example, the phrase "Tiger Woods" is currently attracting a lot of attention from web visitors. In the past, hackers would have tried to create pages which ranked highly for that phrase, but it would have been difficult to get them to appear high enough in the rankings to attract serious traffic. Similarly, attempting to get a page in the Google News results would be difficult as the site only indexes approved news sites.
Now, however, the hackers could simply post a message containing "Tiger Woods" on Twitter and it would appear in the Google results. While it would only appear for a brief time, it could still attract a large audience. And hackers certainly wouldn't have any qualms about repeatedly posting the same message on a social networking site to increase their exposure.
Security is Often a Numbers Game
Of course, the major search engines are already making efforts to detect and remove bogus links. And security firms also work hard to both block such links and limit the consequences once an infected site is visited. The point is that real-time search does not change the basic security challenges; rather, it increases the frequency of those challenges occurring.
Tech firm Cisco warns that this poses a more significant risk to businesses. Today, around 1 in every 50 pages visited on an office computer is a social networking site. If internal connections on an office network are not adequately secured, that means there's much greater potential for a virus picked up in this manner to spread across multiple machines. (Source: google.com)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.