Download now Free registration required
The World Wide Web has become the largest and most accessible source of information. As with every other information repository, its contents need to be indexed and well categorized, bringing henceforth the need for tools that allow fast and accurate searching in order to find the requested information. This process of indexing, categorizing and searching is completed by both known and relatively unknown Web search service providers, such as Google, Yahoo, MSN, Yandex etc. This paper presents patterns used by cyber criminals to exploit search engines and manipulate their results. It will include case studies of SEO (Search Engine Optimization) manipulation, search engine redirections by local malware infection or DNS (Domain Name Server) settings modification.
- Format: PDF
- Size: 546.56 KB