Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

05:38 PM
Jim Rapoza
Jim Rapoza
Connect Directly

Blekko Search Fails To Inspire

The beta service that uses slashtags to narrow your search's sites and topics has some good ideas but too many shortcomings.

Every year or so, a new search site pops up and people wonder if it has the ability to be a "Google killer."

But, outside of Microsoft's Bing, very few new search sites have been designed to compete directly with Google. Most aim at a specific niche of users who are looking for different types of capabilities (though most also probably secretly dream of getting acquired by Google).

This is definitely the case with Blekko, a search service that went into beta this week. The twist that Blekko has is that it makes it possible to easily limit your searches to just an approved set of websites, thus preventing the user from ever seeing unwanted sites, or sites used for spam, phishing and malware infections.

I like the idea of this type of search, though it isn't exactly new. Google makes it possible to limit a search to one site (for example, using site:informationweek.com would limit searches to the InformationWeek site), and desktop power search tools have also long had the ability to limit results to a list of sites.

However, in practice, the current beta of Blekko comes up short in more than a few areas. At least in my tests over the last few days, it appears to need more work before it is ready for regular use. So how does Blekko work? In the simplest form, you need to only do a search followed by a slashtag. For example, you could search on Palin/politics. The slashtag is basically just a list of sites that will be searched for that term. The first problem is that when using Blekko, you need to know if a slashtag already exists for the type of search you want to do. If you just go to the site and search on Passion pit/bostonbands, it will most likely fail.

Blekko has pre-created a list of slashtags but it is hardly comprehensive. And even if there is a slashtag that seems to fit your needs, there’s no guarantee that the sites that the slashtag will search are the ones you would want it to search.


Recommended Reading:

1 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...
PUBLISHED: 2020-07-10
A SQL injection vulnerability in the user and admin web interfaces of Sophos XG Firewall v18.0 MR1 and older potentially allows an attacker to run arbitrary code remotely. The fix is built into the re-release of XG Firewall v18 MR-1 (named MR-1-Build396) and the v17.5 MR13 release. All other version...
PUBLISHED: 2020-07-10
Incorrect file permissions in Citrix ADC and Citrix Gateway before versions 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows privilege escalation.
PUBLISHED: 2020-07-10
Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows reflected Cross Site Scripting (XSS).