Practicing Safe Search
In the world of SEO, there’s the good guys and the bad guys. It’s discussed in great detail on a lot of websites, blogs and forums. So to contribute to the trend, I’ll briefly touch on the subject as well.
The big news as of late to hit the news reel is the royal engagement of Prince William and Kate Middleton, it’s been in print, online, I’m certain it’s been on television and the radio by now as well. But before you run off and hit the web to find all the latest gossip about the couple, follow a few simple rules first.
1) Know full well, that with news which floods the web like this engagement, it’s a prime target for black hat SEO. What black hat is usually associated with are all of the wonderful malware infections which keep computer repairmen in business, and shady companies in cash. What happens is the black hatters pick a hot, fast rising trend, and “poison” the search results. With hundreds of millions of people using search daily, it’s easy to pull in a few unsuspecting curiousity seekers.
2) Don’t click a link, if you don’t recognize the url. When you perform a search in Google, you’ll have the blue link headline, the black description text, and a green url. If that green text is not a website you recognize easily (such as cnn.com or bbc.com for example) take a pass on the link! It doesn’t matter if the description says it has the latest on the wedding, your hard drive and OS will thank you later.
3) The easiest way to gather information via search is built right in now thankfully. All of the major search engines return relevant real time results as well as part of a search. If a topic is trending well, and people are posting about it, there’ll be social and real time search listings.
Do yourself a very big favor when it comes to search, just because the websites which rank in the top 5 say they have the dish on all of the secrets, think first and click later. Malware has larger implications than just slowing down your computer and providing nagging pop ups. It can start there, and go all the way up the ladder to identity theft, password stealing and/or keylogging.