June 18, 2007

Phishers and Malware authors beware!



OK, so it might be a little early to declare victory, but we're excited about the Safe Browsing API we launched today. It provides a simple mechanism for downloading Google's lists of suspected phishing and malware URLs, so now any developer can access the blacklists used in products such as Firefox and Google Desktop.

The API is still experimental, but we hope it will be useful to ISPs, web-hosting companies, and anyone building a site or an application that publishes or transmits user-generated links. Sign up for a key and let us know how we can make the API better. We fully expect to iterate on the design and improve the data behind the API, and we'll be paying close attention to your feedback as we do that. We look forward to hearing your thoughts.

10 comments:

  1. Is there any possibility there could be a test page where users could copy/paste a URL and determine if it was on the blacklist? Kindof like a hello world for the API?

    ReplyDelete
  2. You can also use Vengine to avoid Phishing sites.
    http://www.vengine.com/

    ReplyDelete
  3. So this could spawn the server side checking of attacks URLs.

    1. A Proxy server could blacklist sites from the Safe Browsing API.
    2. Along side virus definitions, mail scanners can omit phising based E-Mails.

    Cool!

    ReplyDelete
  4. This comment has been removed by a blog administrator.

    ReplyDelete
  5. This comment has been removed by a blog administrator.

    ReplyDelete
  6. This comment has been removed by a blog administrator.

    ReplyDelete
  7. This comment has been removed by a blog administrator.

    ReplyDelete
  8. Could you please add Quechup.com to this list, this is an aggressive and deceptive spamming organisation.

    ReplyDelete
  9. This list should be treated like any other blacklist on the Internet today. With that said.

    1. Does the list get automatically downloaded to a server in order to keep it up-to-date?

    2. How can someone get their site taken off of the list after it is determined that they are not hosting malware (or previously were but are not any longer)?

    3. Are there any possible negative legal implications for Google based on them accidentally causing a site to be blacklisted that shouldn't be? Perhaps the software agreement expresses that the user of the list is liable for its proper verification. Something to look into.

    http://www.MBridge.com

    ReplyDelete
  10. it'll be great if there's a downloadable list for squid/squidguard/dansguardian

    ReplyDelete

You are welcome to contribute comments, but they should be relevant to the conversation. We reserve the right to remove off-topic remarks in the interest of keeping the conversation focused and engaging. Shameless self-promotion is well, shameless, and will get canned.

Note: Only a member of this blog may post a comment.