0 days 0 hrs 0 mins 0 secs
  • Google news
  • Google IR score: what is it and how to use for optimization?
    google ir score
  • Google patented behavioral factors: what you need to know and what to do?
    google patented behavioral factors what you need to know
  • SEO pagination: how to do it right? Google announced that it no longer supports the next and prev tags.
    seo pagination
Read More

In 2016 the number of hacked sites increased

97227 site views

Google published a report about Internet security for the year 2016. According to the company, last year the number of hacked websites increased by 32% in comparison with 2015. In addition, in the foreseeable future this trend is unlikely to slow down.

The report noted that hackers have become even more aggressive. However, many webmasters do not promptly update their sites and CMS, making their resources vulnerable to hacking.

To enhance the security of site, Google call to confirm the sites in the Search Console. As a result, their owners will be able to receive notifications about attacks and to quickly solve the problem.

According to Google, 84% of webmasters who confirmed the sites in the Search Console, successfully cope with the recovery of its resources after the break. At the same time 64% of webmasters whose sites were hacked has not received a notice from Google because they don't use this service.

Google also named three of the most common types of attacks and shared tips for recovery sites:

  • Gibberish Hack. The attack of this type is created on the site a lot of pages with meaningless content and keywords. As a result, they appear in the Google search. When visiting these pages, users are redirected to irrelevant pages such as porn sites. How to recover website after this attack, you can see here.
  • Keywords Japanese Hack. The attack of this type on the website create new pages with Japanese text. They monetized through the use of affiliate links to the stores selling counterfeit goods and displayed in the Google Search. Hackers sometimes are registered in the Search Console as the owners of the resource. How to recover website after this attack, you can see here.
  • The Cloaked Keywords Hack. While attack of this type is created on the site a lot of pages with meaningless contents, links and images. Sometimes these pages contain the main elements of the template of the original site, so at first glance they look like a normal page until the user reads the text. In these attacks hackers commonly use cloaking techniques to hide malicious content and make the infected page similar to original page of the website or page with a 404 error. How to recover website after this attack, you can see here.
google security report
Site views
URL parameters of the Google search engine results page
There is a possibility to adjust the results for the base query (which corresponds to the value of the parameter q or as_q ) using a number of get-parameters of the format variable=value used in the URL of the page of search results after the substring /search? . The use of these parameters can be very useful when parsing search results.
Read More
  • Google blog
Most popular in
google earth
Google Earth in browser