Blog Posts Tagged with "Search Engine"

B64e021126c832bb29ec9fa988155eaf

The Deep Web vs. Network Security Monitoring

August 31, 2012 Added by:Dan Dieterle

The “Deep Web”, Dark Web or hidden internet, is a massive collection of sites and databases that don’t show up in standard search engines. So, is this a place that you want ANYONE on your corporate network to visit? NO WAY. Though many use Tor for legitimate purposes, the deep web just isn’t that kind of place...

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Yandex.ru Indexing Crawler Issues

August 30, 2012 Added by:Brent Huston

Sadly, many web crawlers and index bots do not honor the rules of robots.txt. Nor do attackers who are indexing your site for a variety of attack reasons. Given the impacts that some of these indexing tools can have on bandwidth, CPU use or database connectivity, other options for blocking them are sometimes sought...

Comments  (1)

E376ca757c1ebdfbca96615bf71247bb

Shodan: There is Now an App for That

July 11, 2012 Added by:shawn merdinger

Since October, 2010, Shodan has consistently made waves in the information security world. Like any security tool, Shodan can be leveraged by both malicious attackers and legitimate security operations to gain insights into the public IP exposure of an organization. Now enters the Shodan App...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

What is the Deep Web? A Trip into the Abyss...

May 25, 2012 Added by:Pierluigi Paganini

The Deep Web is considered the place where everything is possible, you can find every kind of good and service for sale, but most of them are illegal. The hidden web offers cybercrime great business opportunities, hacking services, malware, stolen credit cards, weapons, etc...

Comments  (0)

296634767383f056e82787fcb3b94864

A History of Google's Government Sales

March 14, 2012 Added by:Jeffrey Carr

Every technology company sells to the government, and compared to Microsoft and Apple the google numbers are pretty low. But since Google is more intimate with our search habits and email content than anyone else, these statistics still make me a little uncomfortable...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

What Actually Changed in Google’s Privacy Policy

February 14, 2012 Added by:Electronic Frontier Foundation

Google did a great job of informing users that the privacy policy had been changed through emails and notifications. Unfortunately, while the policy might be easier to understand, Google did a less impressive job of publicly explaining what in the policy had actually been changed...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Next Generation Search Engine Hacking Arsenal

January 14, 2012 Added by:Pierluigi Paganini

LulzSec and Anonymous use Google Hacking as a means of identifying vulnerable targets, as it provides a complete and regularly updated source of sensitive info. Developers and sysadmins who want to deploy applications on cloud infrastructures should be aware...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Subtle Art of OSINT: Open-Source Intelligence

January 11, 2012 Added by:Infosec Island Admin

The use of OSINT has grown. Earlier on, these sources of information that were being culled and combed through by the likes of Langley, now can be easily done by the likes of you and I with a few tools on the web or applications that you can install on your machines at home...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

ICS-CERT: Control System Internet Accessibility Advisory

January 09, 2012 Added by:Headlines

The use of readily available and generally free search tools significantly reduces time and resources required to identify Internet facing control systems. In turn, hackers can use these tools to easily identify exposed control systems, posing an increased risk of attack...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Western Companies in Collusion with Chinese Oppression

September 21, 2011 Added by:Headlines

"Entering into the Chinese market as a search engine or social media provider is an ethical mine field. In the hands of authorities determined to police their subjects, search engines and social media platforms such as Facebook can become a potent tool of online repression..."

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Google is Your Friend - If You're a Lulzer

June 29, 2011 Added by:Kevin McAleavey

There are exploit GUI's readily available for PostgreSQL, MSSQL and Oracle as well as lesser and older databases. If it's there, and they can find it, and they can talk to it, and you're not properly filtering what can get to it, your site could very well be the next breaking news story...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Internet Overrun with Osama Bin Laden Malware Traps

May 02, 2011 Added by:Headlines

When the user clicks on the link, they will download a file titled XvidSetup.exe. This is actually a popular adware tool known as hotbar. At present, 19 of 41 antivirus engines are blocking the file. Sadly, there will be no shortage of scams taking advantage of this historic news...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Completed Tax Forms Inadvertently Posted Online

April 11, 2011 Added by:Headlines

In the majority of the instances where Chapman found sensitive documents that were indexed and searchable, the owners of the information did not realize that by placing the information on family and/or business websites, they were making the information publicly accessible...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Search Engine Doesn’t Need Kid's Social Security Numbers

April 06, 2011 Added by:Robert Siciliano

Americans have become accustomed to handing over the last four digits of their SSN as an identifier. The coder or marketer at Google who believes it’s reasonable to request the last four digits of children’s SSNs probably readily shares his or her number, which is not a good idea...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

One in Five Search Engine Topics Lead to Malware

March 03, 2011 Added by:Headlines

"Attackers focus on where they can get the most eyeballs and profit, and today that means social networks and search engines. As a community we often point to the need for user education as the missing component..."

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Infosec Insights: Getting Indexed via Twitter – Good and Bad

March 02, 2011 Added by:Brent Huston

Clearly, search engines aren’t the only types of automated applications watching the Twitter stream. My guess is that scanning engines watch it too, to some extent, and queue up hosts in a similar manner. Just like all things, there are good and bad nuances to the tweet to get indexed approach...

Comments  (0)

Page « < 1 - 2 > »