• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Google brands malicious websites with ‘repeat offender’ warnings

November 9, 2016 by Brent Easley 1 Comment

http://www.pcworld.com/article/3139972/internet/google-brands-malicious-websites-with-repeat-offender-warnings.html

 

Google in a fight to protect the users who use their browser, has now a safe browsing arsenal to protect them from using websites with malware and unwanted software.  Google will flag the websites as unsafe using a big red warning sign in the browser.  Sites will have apply to google to get the warning lifted.  Site owners will not be able to apply for a repeal of the warning for 30 days.  The red large warning sign will remain until after the repeal process.

 

Filed Under: Week 11: SQL Injection Tagged With:

Reader Interactions

Comments

  1. Mauchel Barthelemy says

    November 12, 2016 at 11:32 am

    A number of malicious websites exist out there. Often times, those websites’ owners are not badly intention but wrongfully being negligent. In other words, they neglect to apply proper security because they don’t think extra precautionary measures are important. This allows hackers to exploit vulnerabilities from those systems to trigger attacks. Cyber security should be the contribution of at least everyone involved with doing business on the internet and this is a clever way of Google to force other parties to get involved.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in