Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Some six years after Google began notifying web searchers of harmful websites, the company on Tuesday provided updated statistics on its fight against hackers and virus writers.
Google detects 9500 new malicious sites daily, and about 13 million Google searches each day yield warnings about hacked sites that have seen their content changed or links added, according to a blog post.
In addition, the tech giant flags 300,000 downloads each day as potentially malicious.
Google seeks to protect users from websites that may be trying to phish users of their credentials or serve malware. The company defends against two types of the latter: either sites specifically built to distribute malware or those that have been compromised to redirect users, often without their knowledge, to a malicious site.
Grant Asplund, senior technology evangelist at Blue Coat Systems, a web security company, said that despite Google's laudable efforts, the numbers reveal that the criminals continue to find ways to spread their wares. For example, recent Blue Coat research found that one out of every 142 searches leads to a malicious link.
"The way you move mountains is with constant pressure," he told SCMagazine.com on Tuesday. "The cyber criminals are absolutely persistent, they're 24-7 and they're relentless."
Niels Provos, a member of Google's security team, said in the blog post that the fraudsters use varying techniques to ensure their malware-foisting sites evade detection, including rapidly changing their location, using dynamic DNS records and generating automated domain names.
Asplund said making users more informed can help pick up the pieces when technology falls short.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.