Proxy hacking is the process of getting a website indexed through a proxy, which then manipulates the search index for the website. Proxy hacking can be rendered ineffective by limiting connections to your website from open proxies. There is software available for proxy hacking protection that runs either as a part of a Web server or as a part of the webpages themselves.
Spamdexing entails replicating content unrelated to search terms to manipulate the relevancy of webpages indexed by a search engine. This type of attack can be stopped by searching for your content and contacting websites that duplicate it.
Link farms are websites that have a large number of links to each other to manipulate the relevancy of webpages indexed by a search engine. You would also need to contact websites if a link farm links to your website to ask them to stop doing so.
Keyword stuffing is when a webpage has a large number of keywords in the meta tags in an attempt to improve the content's rank in a search engine. Keyword stuffing is an attack on the search engine and not something you can do anything about.
Finally, article spinning involves rewriting existing webpages and replacing parts to avoid being penalized by search engines for using duplicate content. Article spinning, as with spamdexing, can be stopped by contacting the website that is copying your content and having them remove the infringing content.
Dig deeper on Emerging Information Security Threats
Related Q&A from Nick Lewis, Enterprise Threats
The Zeus malware is threatening RTF security by embedding itself in the file, which is commonly seen as safer than other file formats such as PDFs. ...continue reading
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.continue reading
Hybrid threats are becoming an increasing issue for mobile devices. Enterprise threats expert Nick Lewis explains how to mitigate the risk.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.