There’s a saying—"there’s no such thing as a free lunch." On the Web, however, it sure seems like there is. In the time span of a lunch break, a few keywords in a search engine promise free entertainment, just several clicks away. We all know the catch, though. These freebies can come with freeloading adware, malware, and other unwanted programs and plugins. This was particularly true in the Internet’s early days, but in the past decade, tech giants such as Google, Microsoft, and Yahoo—the three major players in search today—have deployed significant resources to prevent adware and malware from compromising their Web browsers, e-mail services, and websites. It can't be that bad in 2013, right?
Answering this question required a little experiment, one inspired by the documentary Super-Size Me. That film chronicles Morgan Spurlock’s month-long fast food “diet” during which he limited his exercise and knowledge about healthy eating, had to order everything on the McDonald’s menu at least once, and never said no to an upgrade offer.
Allie Brosh, Hyperbole and a HalfThe Web version of this is simpler and better for an individual's (physical) health. From a clean computer fresh off an OS install, enter some of the most popular, plausible generic free keyword searches on a popular Web browser. Next, open all of the links in the search results (ads and otherwise) and download the first thing on the landing pages, recording where it went and what it did. Like Spurlock, I would limit my knowledge about what was safe or risky and take no (Internet) precautions beyond the default settings. The same rules applied for installing the program afterward. And in the Web's version of "would you like to super-size that?" I had to say yes to whatever was offered. There would be no avoiding a Web culture of excess and extras.
More programs included with the installation? MOAR! After each keyword search and installation was complete, I’d run several (free) popular antivirus programs to detect unwanted programs and record the installed programs, browser plugins, and extensions. That way it's easy to check later for Internet notoriety.
After a little research, I decided to search for free games, music, e-cards, a wallpaper, and a screensaver for my new computer. This appears to cover a spectrum of entertainment options available on the Web, but several ground rules guided me in selecting these items:
The content had to be plausibly free (“free” had to be the leading keyword) and legal (no purposefully targeting torrents, P2P).To replicate the high bounce rates common for Internet browsing, I exited if I needed to create an account or provide an e-mail or login. I also exited if there was no immediate download option from the landing page, although I was happy to click through several pages or redirections if it promised a free download (though it couldn’t be an unrelated third-party ad).The searched-for content had to be entertainment-oriented (no malware/spyware/antivirus searches), but it could not come from adult sites (online gambling, porn, webcams). In other words, the idea was to look for fun, free stuff—not trouble directly.To no one's surprise, the keywords I selected were popular. However, they were also really, really dangerous. Each search qualified for the "Top 50 Most Riskiest Search Terms in the US" list from McAfee's 2008 roundup, The Web’s Most Dangerous Search Terms report. This experiment even included a pair of No. 1 ill-advised searches:
"free e-cards," listed in the McAfee Top 50, US
"free game cheats," “game cheats” qualifies as a McAfee Top 50
"free games," noted as popular generic search query
"free lyrics," “lyrics," and “song lyrics” were among the McAfee Top 50
"free music downloads," the No. 1 term for Average Risk, McAfee Top 50
"free screensaver," noted as a popular generic search query
"free wallpaper," “wallpaper” is a McAfee Top 50
"free word unscrambler," the No. 1 term for Maximum Risk, McAfee Top 50
In the McAfee report, "free" had the highest category risk. When you run software from an untrusted source, it exposes information about your operating system to the installer, such as your computer model, your IP address, your programs, and what browser you have. And if you are installing software from an adware kingpin, revealing this information is not good. Your information is directly on its way to the adware server.
A computer security expert I consulted beforehand pointed out a potential foil to my experiment. Since I would be installing many adware programs in a short time period—some likely from the same source through different adware networks controlled by the same entity—there was a chance my IP address would be flagged as a particularly gullible user. Other devices using that same IP address later could be vulnerable to a targeted attack if I used a fixed IP address or a narrow range. This required a simple shift. To increase anonymity, free public Wi-Fi was used (and it's likely where you could typically expect some of the downloading behavior I was about to replicate). Combine this with a clean install containing no personal information, and the experiment was as safe as anything involving McAfee may get.
So were these search risks, like human gullibility and those looking to profit from it, timeless or just trends of 2008?
Since Windows is the dominant operating system today, I used a MacBook Pro with a Windows 7 64 bit OEM virtualization via Parallels 7. This functioned basically as a PC petri dish and a sandbox for the potentially dangerous software. I could revert to the original pre-search image after each query—back to default programs with only Mozilla Firefox (one of the three most widely used Internet browsers) and two free popular malware detection programs, Microsoft Security Essentials and Lavasoft’s Ad-Aware.
For each search, I opened a new browser window in Mozilla Firefox—in private browsing mode—and navigated to Google’s search homepage. I saved the image of the clean computer state to Parallels, allowing me to run each search term in a standardized fashion before reverting to the beginning again.
Let the games (and lyrics, and other downloads) begin.
Enlarge / Desktop before search No. 1...
Enlarge / Web browser before search No. 1...
Expand full story
Page: 1 2 3 Next ?
Enlarge / A screenshot of an Android device that's been hacked by modifying the device manufacturer's application. The hack gives access to all permissions on the device.
Enlarge / Part of a secret document published by The Guardian detailing "Dropmire," a program that reportedly spied on encrypted faxes sent to the European Union's Washington, DC, mission.
Enlarge / The Darkleech infection flow.
Enlarge / Google's HTC One strips away Sense in favor of stock Android, Nexus-style.
Enlarge / The AT&T logo on the back is the only thing that differentiates the standard One from the Google Play edition.Specs at a glance: HTC One Google Play editionScreen1920×1080 4.7-inch (468 PPI) Super LCD 3 with RGB MatrixCPUQuad-core 1.7GHz Qualcomm Snapdragon 600Networking802.11a/b/g/n/ac, Bluetooth 4.0, NFCCamera4MP rear camera with "UltraPixel" image sensor, 2.1MP front cameraSize5.41" × 2.69" × 0.37" (137.4 × 68.2 × 9.3 mm)SensorAccelerometer, gyroscope, digital compass, proximity sensor, ambient light sensor
Enlarge / Combine the HTC One and the Nexus 4 and you might just have one of our favorite Android phones.
Enlarge / The Google Play Edition of the One lacks the onscreen software buttons of the Nexus 4. Double tapping the capacitive home button invokes the application switcher.
Ars Technica
Enlarge / A screenshot of an Android device that's been hacked by modifying the device manufacturer's application. The hack gives access to all permissions on the device.
The Hisense Sero 7 Pro (left) and the Nexus 7 (right): peas in a pod.
Enlarge / The Nexus and the Sero 7 Pro are roughly the same size and weight and have an identical button layout.Specs at a glance: Hisense Sero 7 ProScreen1280×800 7" (216 ppi) IPS touchscreenCPU1.2GHz Nvidia Tegra 3 (1.3GHz in single-core mode)Storage8GB NAND flash (expandable via microSD)Networking802.11a/b/g/n, Bluetooth 3.0, NFC, GPSPortsMicro USB, mini HDMI, headphones, microSD cardSize7.87" × 4.95" × 0.43" (199.9 x 125.7 x 10.9 mm)Other perks2MP front camera, 5MP rear camera, power adapter
Enlarge / The Sero runs Android 4.2.1, just a bit out-of-date compared to Android 4.2.2.
Enlarge / Both tablets have rubberized plastic backs, but the Nexus (right) is the better-looking tablet in our opinion.
Enlarge / The Sero has a 5MP rear-facing camera and LED flash that the Nexus lacks.
Enlarge / It also has a mini HDMI port and a microSD card slot, both missing from the Nexus.
Enlarge / Finally, twin rear-facing stereo speakers up the volume and quality very slightly from the Nexus 7's speaker.
Enlarge / The Sero also has some quality control issues that we don't see in our Nexus 7. There's some backlight bleeding around the edge of the screen, shown here, as well as a single stuck pixel.
Enlarge / An indoor snapshot from the Sero. A bit noisy and blurry, but the colors are OK at least.
Enlarge / The same picture from the Nexus 4. The quality is pretty similar, though the Nexus has a higher megapixel count.