Friday, February 7, 2025
HomeInfosec- ResourcesGoogle and Bing Are About to Make it Harder to Find Illegal...

Google and Bing Are About to Make it Harder to Find Illegal Content Online

Published on

SIEM as a Service

Follow Us on Google News

Google and Microsoft have vowed changes to their web indexes which will make life harder for Users looking for unlawful, copyrighted material.

The parties that signed the deal include search providers Google and Microsoft (Bing), and rights holders Motion Picture Association (MPA) and the British Phonographic Industry (BPI).

Through the terms of the arrangement, web search tools have consented to downgrade or delist connects in indexed lists that indicate copyright encroaching locales. This incorporates connections to torrent downloads, file lockers, and illegal movie and music streaming services.

Rights holders will have a say in what connections will be authorized and covered in query items, having the ability to report encroaching destinations.

While Google has gotten takedown sees for over a million sites which journalists claim to encroach on copyrighted material, the organization can’t depend exclusively on this data to settle on an educated choice.

There are areas which are over and over answered to Google for different reasons -, for example, political purposes. A few sites always revealed for encroaching substance, for instance, incorporate the White House, NASA, and the BBC. (You can view Google’s every day copyright see reports over at the organization’s straightforwardness segment.)

The firm already removes specific page links from its search results when rights holders provide evidence of copyright infringement. It also gives a lower ranking to websites that attract a significant numbers of such takedown requests.

According to the BBC ,Eddy Leviten, director general at trade body the Alliance for Intellectual Property, said: “Sometimes people will search for something and they will end up unwittingly being taken to a pirated piece of content.

“What we want to ensure is that the results at the top of the search engines are the genuine ones. It is about protecting people who use the internet, but also protecting the creators of that material too.”

Stan McCoy, of the Motion Picture Association in Europe, welcomed the code of practice, saying pirated websites are currently too easy to find via search engines.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Hackers Leveraging Image & Video Attachments to Deliver Malware

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...