Google Wave is being made available on Wednesday to 100,000 or so developers, early adopters, and Google Apps customers. Unfortunately, cybercriminals are making the most of the launch: They've rolled out a blackhat SEO poisoning campaign to turn interest in Wave into a computer infection.
Google Wave is being made available on Wednesday to 100,000 or so developers, early adopters, and Google Apps customers. Unfortunately, cybercriminals are making the most of the launch: They've rolled out a blackhat SEO poisoning campaign to turn interest in Wave into a computer infection.(As a gauge of that interest, consider that the price for a Google Wave invitation on eBay was bid up to $5,100 before the auction was suspended.)
SEO, or search engine optimization, is the art of optimizing Web sites to appear prominently in search results lists when relevant keywords are searched.
Blackhat SEO tries to do the same thing while flouting search engine guidelines about acceptable practices, such as prohibitions on the deceptive use of text or page elements. Blackhat SEO may also try a parasitic approach, by embedding malicious code in someone else's well-ranked Web page and redirecting the visitor without notice or permission.
In the case of Google Wave, search terms such as "google wave demo video" and "google wave invitation" have recently produced lists of search results which include malicious Web sites that have gamed Google's PageRank system to appear prominently.
Google knows that cybercriminals track popular search terms religiously so they can use those terms to hijack searchers. And it watches closely over its index using automated and manual methods to remove links leading to malicious sites. Chances are that the sites spotted by Websense have already been removed by Google. But it's almost always playing catch-up.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.