That phishing site? Gone in 600 seconds

Did you know that a staggering 60% of phishing websites are only online for a fleeting 10 minutes?

Yes, you read that right. Just ten minutes.

This surprising fact underlines just how rapidly cyber threats are evolving and how vital it is for us to stay ahead of the game.

Phishing sites are fake sites that try to trick you into entering your login details. Or to get you to download malware.

The idea is that cyber criminals drive huge amounts of traffic to them… scam people… then take down the site before it can be detected.

Wouldn’t it be great if we could spot these threats before they vanish into thin air and pop-up elsewhere? Well, Google Chrome has a trick up its sleeve to help us do just that.

Imagine this: You’re running your business, constantly on the move, making split-second decisions. You absent-mindedly visit a website which looks a little… odd. But you don’t panic. You’re using Google Chrome and it scans websites you visit against its list of malicious URLs. 

But uh oh. Google’s list of bad websites is only updated every 30 to 60 minutes. That 60% of phishing domains that are active for just 10 minutes may slip through the net.

Enter Google Chrome’s new security tool, Enhanced Safe Browsing.

As part of a recent update, Chrome has switched it on for everyone. It will now check URLs against a list of domains in real time. Think of it as a cyber bodyguard who can spot and neutralise threats at lightning speed.

Google has confirmed that Enhanced Safe Browsing will continue to offer features like deep scans for files and protection from malicious extensions.

So, does this mean Google will know every URL you visit?

Well, yes. But whilst this new feature does share all visited URLs with Google, the information won’t be used to power other features, including advertising. It’s a trade-off between security and privacy. Given the increasing sophistication of cyber threats, isn’t it worth having an extra layer of protection?

We say embrace these new tools and stay one step ahead of the cyber criminals. After all, the safety of all our businesses depends on it.

If you need additional support protecting your business from phishing scams – or anything else – get in touch.

Like this article?

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

Related Posts

Free malware ransomware scam vector

Don’t Risk It! Why You Shouldn’t Skip Vulnerability Assessments

Cyber threats are a perpetual reality for business owners. Hackers are constantly innovating. They devise new ways to exploit vulnerabilities in computer systems and networks. For businesses of all sizes, a proactive approach to cybersecurity is essential. One of the most crucial elements of this approach is regular vulnerability assessments. A vulnerability assessment is a

Free cybersecurity lock encryption vector

7 Common Pitfalls When Adopting Zero Trust Security

Zero Trust security is rapidly transforming the cybersecurity landscape. It moves away from traditional perimeter-based security models. In this approach, every connection attempt is continuously verified before granting resource access. 56% of global organizations say adopting Zero Trust is a “Top” or “High” priority. This approach offers significant security advantages. But the transition process presents