🕵️ Can someone Google their way to getting hacked?


You might know what "SEO" stands for, right Reader?

​

"Search Engine Optimization"

​

It's just a geeky way to say, "Doing what you can to try and get a Google Seach top-spot."

​

​

And in this week's cybersecurity message: it turns out that some search terms can get you hacked.

​

Called “SEO poisoning,” hackers have found ways to turn your Google searches into helping them.

​

Hackers are ready and waiting for users to Google popular search terms.

​

They’ve already created websites, some known as “lookalikes,” designed to appear at the top of Google searches.

​

That leads us to assume they’re legitimate. In other words, the SEO (search engine optimization) has been compromised, or poisoned.

​

Those websites install malware, steal your PII, hold your data for ransom, and otherwise unleash cybercriminal mayhem with your unsuspecting help.

​

So, don’t trust top search results until you vet them.

Search Term Danger

​

We already heard of the “Bengal Cat in Australia” attack from not long ago.

​

Well searching for free apps, including for “Google Authenticator” app can also be a hacker setup and leads to what’s called “sideloading.”

​

Most of these apps are available on the official app stores, and downloading outside of them is never advised.

​

Unofficial app stores sometimes don’t scan for malware as often or as thoroughly before making them available.

​

That means hackers are free to infect apps with malware, and that leads to big trouble.

​

Taking advantage of users needing help with finances is another poisoned popular search.

​

Whether it’s a loan, a lucrative job offer, or otherwise promising financial assistance are hacker favorites.

​

The search results are setups designed to steal not only PII, but also whatever finances we have still have.

Malvertising, or what’s known as scam ads that install malware or bring us to bogus websites when we click on them, lure a great many users.

​

Those ads seeming to be too good to be true, probably are. To be sure, lookup the legitimate phone number for the seller before you call.

​

But beware, scammer’s provide numbers to call centers ready for your call, so only use legitimately sourced phone numbers.

​

It seems like it’s a jungle out there when even Google searches are compromised. So, stay one step ahead of the bad guys on your next search, you’ll be glad you did.

Stay safe,​
​
​Your Dicar Networks Team


Many of our readers appreciate the peace they have, knowing they're protected from malware and scams through our CNVA Program (Continuous Network Vulnerability Assessment).

For just $80 a month, you can relax too, knowing that your network is under constant monitoring.

For true confidence in your network's security, call us at (408) 850-6400 or reply "Assess My Network" to this email. (Mention that you found us through this email)

Every business is different. That's why we give Tailored IT Solutions so you never have to overpay for tech-bloat.

Here’s how we can support your growth:

  1. Strategic IT Insights – Uncover productivity and growth opportunities with our Business IT Diagnostic Worksheet and Project Planning.
  2. Custom Managed IT Services – Gain peace of mind with IT solutions tailored to your specific requirements and budget.
  3. Next-Gen AI-Driven Security – Protect your business with AI-enhanced, cloud-based physical security, including smart cameras, access control, and environmental monitoring.

Ready to secure and streamline your business? Let's connect today and start building your path forward.

​

​

​

Dicar Networks Offices are located in Morgan Hill, and San Jose, California!

​

Corporate Office
295 E Dunne Ave #120
Morgan Hill, CA 95037
(408) 850-6400
sales@dicarnetworks.com

​

​

​

​

​