SEO Malware injected by Shareaholic
-
Utterly disappointed by your practices to inject “Third Party Data Services” into consumer’s websites.
Seems like a gamble or a roll of a dice with this because you are essentially injecting an iframe for third parties that can be something as simple as a 1px by 1px image from one of your “partner” services or, in at least one instance, there was more crap being injected which was detected when they were trying to execute scripts from the browser DOM.
I say it’s an SEO Malware injected because I don’t know what else to call this. Short of adding several keywords to the footer of the page, this is exactly what this is doing.
Where this is dangerous is, when you are not vetting your “partners” or “third party data services” to “offset operating costs” (as you explain on your own website), you can allow tens of thousands of websites to become phishing bots.
However, I am sure (I certainly hope) that you are not allowing these iframe redirects and script injections on purpose. Probably some bad apples in your pool of “third party data services”.
I did not find the option to disable or turn off this feature in the version of the plugin we were using and just the fact that you have this as part of your services it makes me just want to use Hupso or any other plugin that do not engage in this kind of practices.
- The topic ‘SEO Malware injected by Shareaholic’ is closed to new replies.