A new type of cloaking spam is becoming more popular: Spammers hack popular sites that have a high rating on Yahoo and then insert links keyword rich and redirects to their sites. What can you do to ensure that your website is not abused by spammers?
What is cloaking?
Cloaking is a technique of spam, where content is presented of a search engine spider is different from regular content presented to users.
This is done by delivering content based on user-agent HTTP header of the user requests the page, the IP address of a user or the reference page:
Once the user has been identified as a search engine spider, a server-side script provides a different version of the web page.
The search engine spider can be identified based on the IP address and user-agent HTTP header.
When a user comes to a specific page (eg, Yahoo search results page), a web server offers a different version of the page that users receive when they enter the URL of the page in the browser.
These methods can be combined. A webpage can be blurred based on the IP address, user agent, referring web page, or a combination of these three factors.
How do spammers abuse your website?
Many sites have security holes. Spammers use them to log onto the server and change the content of their websites. They can do the following with your webpages:
How can you find out if spammers abuse your site?
There are several ways to find out if spammers change your web pages:
Use the tips above to see if hackers have changed the content of your web pages. To ensure that hackers can not abuse your site, please use the latest version of your content management system and install security updates.