Google’s security team built the Safe Browsing to identify the malicious websites and warn the users about various online risks. This technology scans billions of URLs per day and looks for unsafe websites and flags them. Up until now, the unsafe websites were put into two categories —Malware sites and Phishing sites.
Now, Google has expanded its Safe Browsing feature to protect you from deceptive embedded contents like deceptive download buttons, or a fake image that warns you about the potential threats inside your system.
This step is a part of Google’s social engineering policy announced in November that categorized the embedded content on a web page as social engineering when — a website tries to deceive you by looking like a trusted entity (website, browser, or device), or a website tricks you into entering your passwords or sharing some personal information.
To make the people more aware, Google has also shared some examples of the deceptive content in a Google Online Security blog post.
Here’s an image from a website that claims that your software is out-of-date to trick you into clicking the ‘update’ button —
Here are the fake download and play buttons that seem like a part of a website (video streaming or TV show) —
So, if Google considers that a website is hosting deceptive content, it will show a bright red screen with warning “Deceptive site ahead”. This warning will prevent the users from clicking the misleading ads that trick them into downloading malware.
Google calls it ‘just the beginning’ of its fight against social engineering and promises to roll out more features to improve the web browsing experience of the users.
For the website admins, Google suggests them to check their webmaster toolsconsole to see if their site is flagged for containing social engineering content.
“Hunted” schoolgirls’ nude images and personal info published online
More than 2,000 sexual images of underage girls and women have been shared by teen boys and young men, on an...August 17, 2016
Why you STILL can’t trust password strength meters
I’m worried about password strength meters. In March 2015 I tested five popular password strength meters in a simple experiment that...August 17, 2016
Facebook’s unblockable-ads push is a “big bluff”
Facebook, the adblocker ball’s back in your court, but researchers seem to have punched some holes in your racket. I’ve just...August 17, 2016
Did “The Shadow Brokers” hack NSA cyberweapons worth $500M?
A self-styled hacking group going by The Shadow Brokers have started a tongue-in-cheek media campaign claiming that they’ve penetrated the NSA...August 16, 2016
US hotels hit by payment card slurping malware
The chain that owns Westin, Starwood, Marriott, Hyatt, Intercontinental and Le M?ridien hotels – HEI Hotels & Resorts – on Friday...August 16, 2016
People like using passwords way more than biometrics
A new survey shows that we’ll give up our passwords only when they’re pried from our cold, dead hands. That’s more...August 16, 2016
“You dirty RAT” – Spy versus Spy in the cybercrime underworld
Thanks to Gabor Szapannos of SophosLabs, who did the hard work behind this article. Not all malware is ransomware, even though...August 16, 2016
Silk Road suspect “Libertas” can be extradited to US, says court
Back in December 2013, the US Department of Justice (DoJ) charged three individuals with three different offences stemming from the now-defunct...August 15, 2016
Tech support scammer tricked into installing ransomware
First things first, we do not recommend that you screw around with crooks. That includes fake support calls, 419 scammers and...August 15, 2016