Thursday, March 28, 2024

Google and Bing Are About to Make it Harder to Find Illegal Content Online

Google and Microsoft have vowed changes to their web indexes which will make life harder for Users looking for unlawful, copyrighted material.

The parties that signed the deal include search providers Google and Microsoft (Bing), and rights holders Motion Picture Association (MPA) and the British Phonographic Industry (BPI).

Through the terms of the arrangement, web search tools have consented to downgrade or delist connects in indexed lists that indicate copyright encroaching locales. This incorporates connections to torrent downloads, file lockers, and illegal movie and music streaming services.

Rights holders will have a say in what connections will be authorized and covered in query items, having the ability to report encroaching destinations.

While Google has gotten takedown sees for over a million sites which journalists claim to encroach on copyrighted material, the organization can’t depend exclusively on this data to settle on an educated choice.

There are areas which are over and over answered to Google for different reasons -, for example, political purposes. A few sites always revealed for encroaching substance, for instance, incorporate the White House, NASA, and the BBC. (You can view Google’s every day copyright see reports over at the organization’s straightforwardness segment.)

The firm already removes specific page links from its search results when rights holders provide evidence of copyright infringement. It also gives a lower ranking to websites that attract a significant numbers of such takedown requests.

According to the BBC ,Eddy Leviten, director general at trade body the Alliance for Intellectual Property, said: “Sometimes people will search for something and they will end up unwittingly being taken to a pirated piece of content.

“What we want to ensure is that the results at the top of the search engines are the genuine ones. It is about protecting people who use the internet, but also protecting the creators of that material too.”

Stan McCoy, of the Motion Picture Association in Europe, welcomed the code of practice, saying pirated websites are currently too easy to find via search engines.

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles