Monday, November 25, 2024
HomeInfosec- ResourcesGoogle and Bing Are About to Make it Harder to Find Illegal...

Google and Bing Are About to Make it Harder to Find Illegal Content Online

Published on

Google and Microsoft have vowed changes to their web indexes which will make life harder for Users looking for unlawful, copyrighted material.

The parties that signed the deal include search providers Google and Microsoft (Bing), and rights holders Motion Picture Association (MPA) and the British Phonographic Industry (BPI).

Through the terms of the arrangement, web search tools have consented to downgrade or delist connects in indexed lists that indicate copyright encroaching locales. This incorporates connections to torrent downloads, file lockers, and illegal movie and music streaming services.

- Advertisement - SIEM as a Service

Rights holders will have a say in what connections will be authorized and covered in query items, having the ability to report encroaching destinations.

While Google has gotten takedown sees for over a million sites which journalists claim to encroach on copyrighted material, the organization can’t depend exclusively on this data to settle on an educated choice.

There are areas which are over and over answered to Google for different reasons -, for example, political purposes. A few sites always revealed for encroaching substance, for instance, incorporate the White House, NASA, and the BBC. (You can view Google’s every day copyright see reports over at the organization’s straightforwardness segment.)

The firm already removes specific page links from its search results when rights holders provide evidence of copyright infringement. It also gives a lower ranking to websites that attract a significant numbers of such takedown requests.

According to the BBC ,Eddy Leviten, director general at trade body the Alliance for Intellectual Property, said: “Sometimes people will search for something and they will end up unwittingly being taken to a pirated piece of content.

“What we want to ensure is that the results at the top of the search engines are the genuine ones. It is about protecting people who use the internet, but also protecting the creators of that material too.”

Stan McCoy, of the Motion Picture Association in Europe, welcomed the code of practice, saying pirated websites are currently too easy to find via search engines.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Best SIEM Tools List For SOC Team – 2024

The Best SIEM tools for you will depend on your specific requirements, budget, and...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...

8 Common Hacking Techniques & 3 Ways to Avoid Them All

Hackers come in many forms with sophisticated Hacking Techniques, While there has been a...