Friday, January 31, 2025
HomeInfosec- ResourcesGoogle and Bing Are About to Make it Harder to Find Illegal...

Google and Bing Are About to Make it Harder to Find Illegal Content Online

Published on

SIEM as a Service

Follow Us on Google News

Google and Microsoft have vowed changes to their web indexes which will make life harder for Users looking for unlawful, copyrighted material.

The parties that signed the deal include search providers Google and Microsoft (Bing), and rights holders Motion Picture Association (MPA) and the British Phonographic Industry (BPI).

Through the terms of the arrangement, web search tools have consented to downgrade or delist connects in indexed lists that indicate copyright encroaching locales. This incorporates connections to torrent downloads, file lockers, and illegal movie and music streaming services.

Rights holders will have a say in what connections will be authorized and covered in query items, having the ability to report encroaching destinations.

While Google has gotten takedown sees for over a million sites which journalists claim to encroach on copyrighted material, the organization can’t depend exclusively on this data to settle on an educated choice.

There are areas which are over and over answered to Google for different reasons -, for example, political purposes. A few sites always revealed for encroaching substance, for instance, incorporate the White House, NASA, and the BBC. (You can view Google’s every day copyright see reports over at the organization’s straightforwardness segment.)

The firm already removes specific page links from its search results when rights holders provide evidence of copyright infringement. It also gives a lower ranking to websites that attract a significant numbers of such takedown requests.

According to the BBC ,Eddy Leviten, director general at trade body the Alliance for Intellectual Property, said: “Sometimes people will search for something and they will end up unwittingly being taken to a pirated piece of content.

“What we want to ensure is that the results at the top of the search engines are the genuine ones. It is about protecting people who use the internet, but also protecting the creators of that material too.”

Stan McCoy, of the Motion Picture Association in Europe, welcomed the code of practice, saying pirated websites are currently too easy to find via search engines.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...