{"id":103,"date":"2008-02-25T10:33:46","date_gmt":"2008-02-25T09:33:46","guid":{"rendered":"http:\/\/blog.intego.com\/2008\/02\/25\/three-million-dangerous-websites\/"},"modified":"2008-02-25T10:33:46","modified_gmt":"2008-02-25T09:33:46","slug":"three-million-dangerous-websites","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/","title":{"rendered":"Three Million Dangerous Websites"},"content":{"rendered":"<p>You&#8217;ve been warned that visiting web sites can be dangerous, but have you ever wondered how serious the risk is? Google checks web pages, when cataloging them, to see if they contain malware &#8211; malicious code that can take advantage of vulnerabilities in web browsers or plug-ins, such as Flash and QuickTime. Their <a href=\"http:\/\/googleonlinesecurity.blogspot.com\/2008\/02\/all-your-iframe-are-point-to-us.html\">latest published results<\/a> show that more than three million unique URLs on over 180,000 web sites attempt to install malware. That&#8217;s more than 1% of web sites they catalogue! <\/p>\n<p>Naturally, you won&#8217;t encounter evil web pages on mainstream web sites &#8211; those of Google, Yahoo!, major news outlets, etc. &#8211; but you may find them on middle-of-the-road web sites, where malware can be injected into web pages by third-party content, including ads. When this occurs, the web sites themselves are generally unwitting vectors of this malware; they may be hacked, as Google found that more than 38% of Apache (popular web server software) and PHP (used to create dynamic pages) are out of date. Since these programs issue regular updates when security vulnerabilities are discovered, web hosts that don&#8217;t update them are putting their visitors at risk.<\/p>\n<p>There&#8217;s not many &#8220;safe browsing&#8221; techniques you can use &#8211; unlike when you know not to go into a bad neighborhood in a city, dangerous web sites can be just a click away, and once you load a page it may be too late. So you need proactive security, such as <a href=\"https:\/\/www.intego.com\/netbarrier\/\">Intego NetBarrier<\/a>, which protects your Mac from the dangers of the Internet. You should also make sure that you apply all of Apple&#8217;s security updates, which can patch vulnerabilities in software such as QuickTime, which has seen many such issues in recent months.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;ve been warned that visiting web sites can be dangerous, but have you ever wondered how serious the risk is? Google checks web pages, when cataloging them, to see if they contain malware &#8211; malicious code that can take advantage of vulnerabilities in web browsers or plug-ins, such as Flash and QuickTime. Their latest published [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"You&#039;ve been warned that visiting web sites can be dangerous, but have you ever wondered how serious the risk is? Google checks web pages, when cataloging\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Million Dangerous Websites - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"You&#039;ve been warned that visiting web sites can be dangerous, but have you ever wondered how serious the risk is? Google checks web pages, when cataloging\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-02-25T09:33:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/\",\"name\":\"Three Million Dangerous Websites - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2008-02-25T09:33:46+00:00\",\"dateModified\":\"2008-02-25T09:33:46+00:00\",\"description\":\"You've been warned that visiting web sites can be dangerous, but have you ever wondered how serious the risk is? Google checks web pages, when cataloging\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three Million Dangerous Websites\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Three Million Dangerous Websites\",\"datePublished\":\"2008-02-25T09:33:46+00:00\",\"dateModified\":\"2008-02-25T09:33:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#webpage\"},\"wordCount\":285,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"You've been warned that visiting web sites can be dangerous, but have you ever wondered how serious the risk is? Google checks web pages, when cataloging","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/","og_locale":"en_US","og_type":"article","og_title":"Three Million Dangerous Websites - The Mac Security Blog","og_description":"You've been warned that visiting web sites can be dangerous, but have you ever wondered how serious the risk is? Google checks web pages, when cataloging","og_url":"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-02-25T09:33:46+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/","name":"Three Million Dangerous Websites - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2008-02-25T09:33:46+00:00","dateModified":"2008-02-25T09:33:46+00:00","description":"You've been warned that visiting web sites can be dangerous, but have you ever wondered how serious the risk is? Google checks web pages, when cataloging","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Three Million Dangerous Websites"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Three Million Dangerous Websites","datePublished":"2008-02-25T09:33:46+00:00","dateModified":"2008-02-25T09:33:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/three-million-dangerous-websites\/#webpage"},"wordCount":285,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1F","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=103"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}