Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

11/4/2010
05:38 PM
Jim Rapoza
Jim Rapoza
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Blekko Search Fails To Inspire

The beta service that uses slashtags to narrow your search's sites and topics has some good ideas but too many shortcomings.

Every year or so, a new search site pops up and people wonder if it has the ability to be a "Google killer."

But, outside of Microsoft's Bing, very few new search sites have been designed to compete directly with Google. Most aim at a specific niche of users who are looking for different types of capabilities (though most also probably secretly dream of getting acquired by Google).

This is definitely the case with Blekko, a search service that went into beta this week. The twist that Blekko has is that it makes it possible to easily limit your searches to just an approved set of websites, thus preventing the user from ever seeing unwanted sites, or sites used for spam, phishing and malware infections.

I like the idea of this type of search, though it isn't exactly new. Google makes it possible to limit a search to one site (for example, using site:informationweek.com would limit searches to the InformationWeek site), and desktop power search tools have also long had the ability to limit results to a list of sites.

However, in practice, the current beta of Blekko comes up short in more than a few areas. At least in my tests over the last few days, it appears to need more work before it is ready for regular use. So how does Blekko work? In the simplest form, you need to only do a search followed by a slashtag. For example, you could search on Palin/politics. The slashtag is basically just a list of sites that will be searched for that term. The first problem is that when using Blekko, you need to know if a slashtag already exists for the type of search you want to do. If you just go to the site and search on Passion pit/bostonbands, it will most likely fail.

Blekko has pre-created a list of slashtags but it is hardly comprehensive. And even if there is a slashtag that seems to fit your needs, there’s no guarantee that the sites that the slashtag will search are the ones you would want it to search.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31476
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...
CVE-2021-31477
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311 14A03. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-...
CVE-2021-32690
PUBLISHED: 2021-06-16
Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This...
CVE-2021-32691
PUBLISHED: 2021-06-16
Apollos Apps is an open source platform for launching church-related apps. In Apollos Apps versions prior to 2.20.0, new user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within th...
CVE-2021-32243
PUBLISHED: 2021-06-16
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).