Do you think the new Google malware warning feature will actually help prevent malware? If hackers are able to...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
manipulate Google results to their benefit, they'd be able to manipulate this as well, right?
More systems and companies are taking steps to actively notify users in contextually relevant ways that they are infected with malware, help them get their systems cleaned from malware and ideally harden their systems against future malware infection. Many times users do not know they have been infected with malware because the malware has circumvented the local security controls (the antivirus software) that should have notified the user the system is infected. The user may not even know they are infected until a large sum of money is transferred out of their bank account. The notification needs to be contextually relevant, meaning the user must understand why the warning is important, what action they should take to correct the problem and should explain this in terms they understand.
Hackers and malware will adapt to manipulate the Google malware warning system, which displays a message to users at the top of Google search results pages when Google detects what may be a malware infection on the user's system, so it is not displayed like other warnings that have been circumvented.
To be clear, Google’s warning to users of infected systems will not remove or stop current malware, but it does provide an additional check that could provide some notification. There is potential for false positives, but even a false positive to an end user notifying them they need to check the security of their system would not be harmful. However, a false positive may confuse the user and cause them to perform a security check that is not necessary. In a network behind a NAT, this notification might produce more false positives, since identifying individual systems behind the NAT to ensure only infected systems are notified could be a challenge.
Dig Deeper on Endpoint protection and client security
Related Q&A from Nick Lewis
An Apache Struts vulnerability is still being exploited, even though it has already been patched. Expert Nick Lewis explains why the Struts platform ...continue reading
A revamped Poison Ivy RAT campaign has been using new evasion and distribution techniques. Expert Nick Lewis explains the new attack methods that ...continue reading
Fileless malware hidden in server memory led to attacks on many companies worldwide. Expert Nick Lewis explains how these attacks fit in with the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.