Looking for a Math Answer on Google? You Could be Viewing Explicit Material

By Jamie Epstein February 12, 2013

Google is touted as a one-stop-shop website that allows visitors to search through a pretty overwhelming amount of information including images, maps, videos and much more. While the search giant is usually known for its cool animations on its main page that changes by the day as well as its easy-to-use format that makes looking for something a synch, it seems as if the company may have taken a cue from Broadway show Avenue Q, a play that contains the extremely popular song titled “The Internet is For Porn.”

That’s right I said it, porn. And that is exactly the search results appearing before bewildered Web browsers eyes when entering certain mathematical equations into the site’s search query box.

Originally uncovered by a user on the Q&A site Quora, who wrote a question containing the numbers and symbols, “4^(1/4)," instead of an answer I couldn’t figure out if you left me alone in a room for months, links to popular porn sites appeared. While these r-rated pictures and videos may serve as a welcome distraction to some, most are in unison agreeing that that this bug needs to be eliminated before it causes some major consequences for not only Google but the innocent victim trying to overcome a tough math problem. Can you image the ramifications that would occur if your boss just happened to walk by your desk at that very minute that countless porn sites filled your computer screen? It likely wouldn’t result in a raise.

At this time, the technology leader has yet to discuss the aforementioned incidents, but an engineer at Google has come forward to reveal that it is now working on fixing what is happening and pretty soon those seeking answers to their brain busting math questions but secretly hoping to see some porn, will be extremely disappointed.

While these obstacles will likely be overcome in a very short time period, the redirecting of an individual’s search could highlight a much bigger problem, being hijacked by another Web browser. Coined Browser Hijacking, the term is defined as a type of online cyber attack that prompts your browser of choice to travel somewhere other than where you wished. 

In a statement, YooSecurity reveals on its site, “We have been receiving lots of customer help requests and consultation inquiries from various partners on how to remove the browser redirect hijackers like redirecting Google search engine results and Internet browser’s homepage. It is becoming more and more annoying to have loads of new hijackers showing up on the Internet and nobody seems to stop any of these new releases.”

“For every average computer user, the homepage of your Internet browser may have been redirected to an unknown site rather the one you have specified; whenever you open your favorite Internet explorer, you will be redirected to some random websites or annoying popups are showing up; whenever you enter terms into the search engines like Google, you are being redirecedt to other websites or search engines; unwanted toolbars are being uninstalled on Internet browsers (e.g. Chrome, Internet Explorer, Firefox) without your consent or you notice a dramatic slow down in your surfing experienceyou’re your private information from whatever you are doing on the Internet is being collected without your permission. In most of these cases, you may have been infected with malicious applications,” the site added.

To avoid being attacked by malware, be sure to continuously update your anti-virus and malware protection software as this can mean the difference between solving that annoying math problem you have been starting at for hours or facing your boss after being accused of enjoying some porn at the workplace.

Edited by Amanda Ciccatelli

TechZone360 Web Editor

Related Articles

Microsoft One-Ups Apple, PC Manufacturers with Surface Desktop

By: Doug Mohney    10/26/2016

Once upon a time, Apple was king of hardware design, be it the desktop, laptop, or tablet. No longer. Microsoft is now the one to watch as it hones in…

Read More

Hurdles for Operators Deploying a Multi-Point Wireless Backhaul System

By: Greg Friesen    10/26/2016

Multi-point wireless systems offer much promise for backhaul. An operator can deploy a single central unit (CU) and the connect end sites as they are …

Read More

Free Public Wi-Fi: Is it a Trick or a Treat?

By: Special Guest    10/26/2016

Public Wi-Fi allows us to stay connected wherever we go. While the convenience drives us to connect more often, by no means does that indicate we're i…

Read More

Will the Next Generation of Computers be Crowdsourced? Maybe

By: Doug Mohney    10/25/2016

If you have any doubts that the world of PC design has stagnated - looking at you Apple, Dell, HP, Lenovo, and whoever else is left standing this week…

Read More

The Cybersecurity Race to Secure the Internet of Things

By: Doug Mohney    10/25/2016

Last week's wave of worldwide DDoS (Distributed Denial of Service) attacks through the use of unsecured Internet of Things (IoT) devices is both distu…

Read More