Google Wave is being made available on Wednesday to 100,000 or so developers, early adopters, and Google Apps customers. Unfortunately, cybercriminals are making the most of the launch: They've rolled out a blackhat SEO poisoning campaign to turn interest in Wave into a computer infection.
Google Wave is being made available on Wednesday to 100,000 or so developers, early adopters, and Google Apps customers. Unfortunately, cybercriminals are making the most of the launch: They've rolled out a blackhat SEO poisoning campaign to turn interest in Wave into a computer infection.(As a gauge of that interest, consider that the price for a Google Wave invitation on eBay was bid up to $5,100 before the auction was suspended.)
SEO, or search engine optimization, is the art of optimizing Web sites to appear prominently in search results lists when relevant keywords are searched.
Blackhat SEO tries to do the same thing while flouting search engine guidelines about acceptable practices, such as prohibitions on the deceptive use of text or page elements. Blackhat SEO may also try a parasitic approach, by embedding malicious code in someone else's well-ranked Web page and redirecting the visitor without notice or permission.
In the case of Google Wave, search terms such as "google wave demo video" and "google wave invitation" have recently produced lists of search results which include malicious Web sites that have gamed Google's PageRank system to appear prominently.
Google knows that cybercriminals track popular search terms religiously so they can use those terms to hijack searchers. And it watches closely over its index using automated and manual methods to remove links leading to malicious sites. Chances are that the sites spotted by Websense have already been removed by Google. But it's almost always playing catch-up.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.