Proxy hacking is the process of getting a website indexed through a proxy, which then manipulates the search index for the website. Proxy hacking can be rendered ineffective by limiting connections to your website from open proxies. There is software available for proxy hacking protection that runs either as a part of a Web server or as a part of the webpages themselves.
Spamdexing entails replicating content unrelated to search terms to manipulate the relevancy of webpages indexed by a search engine. This type of attack can be stopped by searching for your content and contacting websites that duplicate it.
Link farms are websites that have a large number of links to each other to manipulate the relevancy of webpages indexed by a search engine. You would also need to contact websites if a link farm links to your website to ask them to stop doing so.
Keyword stuffing is when a webpage has a large number of keywords in the meta tags in an attempt to improve the content's rank in a search engine. Keyword stuffing is an attack on the search engine and not something you can do anything about.
Finally, article spinning involves rewriting existing webpages and replacing parts to avoid being penalized by search engines for using duplicate content. Article spinning, as with spamdexing, can be stopped by contacting the website that is copying your content and having them remove the infringing content.
Dig Deeper on Emerging cyberattacks and threats
Related Q&A from Nick Lewis
Enterprises new to the cloud can write new security policies from scratch, but others with broad cloud usage may need an update. Consider these ... Continue Reading
Cloud security providers need to play catch-up with the evolving advancements in cloud technology. Find out what the top CSPs offer today and which ... Continue Reading
Cloud security certifications serve to bolster security professionals' resumes and boost value to employers. Learn about the top certifications ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.