Do you think the new Google malware warning feature will actually help prevent malware? If hackers are able to...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
manipulate Google results to their benefit, they'd be able to manipulate this as well, right?
More systems and companies are taking steps to actively notify users in contextually relevant ways that they are infected with malware, help them get their systems cleaned from malware and ideally harden their systems against future malware infection. Many times users do not know they have been infected with malware because the malware has circumvented the local security controls (the antivirus software) that should have notified the user the system is infected. The user may not even know they are infected until a large sum of money is transferred out of their bank account. The notification needs to be contextually relevant, meaning the user must understand why the warning is important, what action they should take to correct the problem and should explain this in terms they understand.
Hackers and malware will adapt to manipulate the Google malware warning system, which displays a message to users at the top of Google search results pages when Google detects what may be a malware infection on the user's system, so it is not displayed like other warnings that have been circumvented.
To be clear, Google’s warning to users of infected systems will not remove or stop current malware, but it does provide an additional check that could provide some notification. There is potential for false positives, but even a false positive to an end user notifying them they need to check the security of their system would not be harmful. However, a false positive may confuse the user and cause them to perform a security check that is not necessary. In a network behind a NAT, this notification might produce more false positives, since identifying individual systems behind the NAT to ensure only infected systems are notified could be a challenge.
Dig Deeper on Client security
Related Q&A from Nick Lewis
Locky ransomware has borrowed features from Dridex malware, which focused on attacking banks. Expert Nick Lewis explains Locky's techniques and how ...continue reading
The Mazar malware can wipe an entire Android device once it has been installed. Expert Nick Lewis explains how this malware works, and how attacks ...continue reading
MouseJack, a wireless mouse and keyboard security flaw, allows attackers to type malicious commands. Expert Nick Lewis explains how enterprises can ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.