Skip to main content

Safe Browsing on Blogger

National Cyber-Security Awareness Month is here once again. In that spirit we wanted to share a bit about what we are doing on Blogger to help fight malicious content, along with some tips for a safer browsing experience online. While spammers are always coming up with new tricks, the combination of Blogger’s abuse-fighting systems and the security features of modern browsers helps ensure that you’ll be able to browse through your favorite blog content with confidence.

We’ve partnered with other abuse-fighting teams within Google to develop sophisticated systems for automatically detecting and quarantining nefarious content on Blogspot. Over the years, our teams have analyzed the patterns and behavior of malicious blogs and code, and with each new detection our existing algorithms are trained for better coverage in the future. As a result, we are able to catch and quarantine thousands of malicious blogs each year, and are happy to say that our overall spam levels are at an all-time low across our service.

Of course, while our automated systems provide great coverage for a wide variety of abuse types, you can always let us know about suspicious blogs by reporting them directly to us via our online form. We’re also looking to you, the users, to be our eyes on the web and let us know anything that may have escaped our existing systems.

Beyond partnering with us on the detection process, you can also make a difference in your own online security by taking advantage of your browser’s built-in security. Modern browsers have powerful security features that can detect potentially malicious sites and alert you should you stumble upon them. Using technology like Google’s Safe Browsing tools, users of many browsers see warning screens when attempting to visit sites that automated systems have determined to contain suspicious content. To make sure you have the latest and most secure browser version, please check out the following browser sites:

We also recommend using one of the following tools to keep your browser plug-ins up to date: Google-developed SecBrowsing; Mozilla Plugin Check.

For more tips on safe browsing and security on the web, check out the home of Cyber Security Awareness Month at the http://staysafeonline.org/.


Comments



Free Educational Website For All

Popular posts from this blog

Buruj mudahkan pengenalan bintang di langit

Terdapat 88 sistem buruj di langit. Buruj sebenarnya adalah titik-titik bintang yang dikumpul dan dibahagikan serta diberikan nama-nama tertentu berdasarkan bentuk supaya mudah diingat. Ini merupakan cara sistem buruj mula terbentuk. Justeru, buruj ini sebenarnya bukanlah satu perkara yang benar. Ia sebenar adalah lambang khayalan ahli-ahli syair, petani dan juga astronomi lebih 6,000 tahun lalu. Tujuan sebenar penciptaan buruj ini adalah bagi membantu kita mengenal pasti jutaan bintang di langit. Semasa langit gelap, anda boleh melihat lebih kurang 1,000 hingga 1,500 bintang. Pasti sukar untuk kita mengenal pasti bintang yang mana satu. Malah sekali imbas, titik cahaya yang berkedipan di langit malam kelihatan sama sahaja. Oleh itu, beribu tahun dahulu, ahli astronomi awal telah membahagikan bintang mengikut kumpulan dan melukis gambar khayalan seperti kala jengking atau beruang, di sekeliling kumpulan bintang tersebut supaya mudah diingat. Bintang di dalam sesuatu buruj itu se...

The Social Network: Communicating in code

By  Jim Emerson  on  October 2, 2010 9:43 PM  |   Permalink  |  Comments (48) "When an individual enters the presence of others, they commonly seek to acquire information about him already possessed. They will be interested in his general socio-economic status, his conception of self, his attitude toward them, his competence, his trustworthiness, etc. Although some of this information seems to be sought almost as an end in itself, there are usually quite practical reasons for acquiring it. Information about the individual helps to define the situation, enabling others to know in advance what he will expect from them and what they may expect from him. Informed in these ways, the others will know how best to act in order to call forth a desired response from him." -- from "The Presentation of Self in Everyday Life" by Erving Goffman (1959) Relationship status: Interested in: -- Facebook (2004) The actual Mark Zuckerberg is said to have taken fencing w...

Harapkan Pegar, Pegar Makan Padi

Today I’m going to talk about a rather important issue in Malay language; which is lost in translation of words from Jawi to Rumi. Tiada pagar makan padi. Tetapi burung pegar. Kesilapan berlaku disebabkan perubahan ejaan rumi daripada jawi.    Namaku Si Pegar, bukan Pagar!   Ha, nilah contoh burung pegar, atau dalam Englishnya berbunyi ‘pheasant’. Dekat Malaysia rupanya kita panggil ayam pegar, dekat Indonesia pulak dipanggil burung pegar. Tapi ayam ke, burung ke; kedua-duanya bertepatanlah dengan peribahasa ‘harapkan pegar, pegar makan padi’. OK, patutlah. Selama ni ingatkan pagar. Sebab tulah rasa pelik, kenapa pagar makan padi? Lagipun zaman dulu mana ada orang pagar sawah padi (ada ke? Rasa macam takde...). Rupanya orang maksudkan pegar. Pegar ni digunakan macam burung hantu lah agaknya. Kawalan biologi untuk membunuh tikus dan serangga perosak dekat sawah padi. Tetapi ketika mengharap burung pegar ini tolong makan tikus dan serangga di sawa...