SlideShare a Scribd company logo
1 of 13
NEGATIVE SEO




What Is Negative SEO & How To Protect 
                Yourself
What is Negative SEO

    It  is  the  reverse  version  of  Search  Engine 
    Optimization.

    The  aim  of  SEO  is  to  increase  a  site's 
    visibility in SERP.

    Whereas  Negative  SEO  is  to  reduce  the  site 
    ranking in search result page.  
Why Use Negative SEO?
Three main cases:­

    To downgrade your competitor's sites.

    To  bury  bad  news  about  yourself  of  your 
    company.

    Targeted  Negative  SEO(TNS)  attack  on  the 
    website.
How to defend yourself against
                Negative SEO
 
     Make  sure  by  checking  Bing  &  Google 
     Web­master tools regularly.
 
     By  checking  your  email  address  and 
     react to notifications emails properly.
 
     If  you  are  hit  by  virus  or  malware  try 
     to  get  your  website  back  to  on­line  as 
     soon as possible.
 
     Remove potentially damaging material 
     from  your  website  and  in  social  media 
     pages  fix  any  pages  that  might  have 
     bad links on them.

    If  Distributed  denial  of  services(DDOS) 
    attack occur means inform to your web host 
    as  they  can  do  something  to  mitigate  the 
    damage.

    Use  reconsideration  request  if  you  have 
    been penalized.

    Try  to  identify  the  source.  ­  sometimes  of­
    fence  is  the  best  defence  and  if  you  can 
    prove  that  a  competitor  is  damaging  your 
    websites revenue, you may have grounds to 
    sue.

    Try to develop solid site structure

    Clean link profile

    Create website design with useful content.
How is Negative SEO done

    Adding  the  offending  content  into 
    your site by hacking

    Google bowling
    This  is  the  technique  designed  to 
   remove  a  site  from  SERP  my 
   making Google itself believe that the 
   site  is  spammy.  Google  bowling  can 
   be done by following two ways.
1.Adding  link  to  the  site  from  lots  of 
  bad  neighborhoods  this  link  forms 
  automatically  generated  spammy 
  pages.
2. Find a page on your competitors website 
  which have dynamic URL and hacking that 
  page by making some changes in their 
  competitor url like
  http:mycompetitor.com/index.php?page=11 
  change this into 
  http:mycompetitor/index.php?page=12 but 
  has the same content then this changes will be 
  showing your site as a vulnerable to google 
  bowling by URL manipulation.

    CLICK FRAUD:­
      Click  on  the  competitor  website 
  advertise  to  use  up  to  their  budget  or 
  limit and affect the number of genuine 
  visitors  of  them.  But  google  is  really 
  good to detect these kind of hacking so 
  no  more  impact  for  this  method  of 
  Negative SEO.

    ADSENSE BANNING:­
  This is also similar like click fraud that 
  clicking competitor adverts on their site 
  many  times  until  the  ad­sense  account 
  get suspended. 

    BLACK SOCIAL BOOKMARKING:
    Creating  lots  of  bogus  social  media 
   accounts  like          Face­book,  Twitter, 
   Google+  by  using  this  creating  and 
   posting spammy links to target sites.

    FALSE DUPLICATE CONTENT:­  
      Getting  content  from  competitor  page 
    and  post  on  your  page  before  the 
    competitor  page  crawled  in  google  so 
    that  your  page  is  1st  crawled  and  that 
    competitor page considered as a spam.
Conclusion

   The only way to get safe from Negative SEO 
is  we  should  update  our  site  by  making 
regular  content  reviews  and  back­link  checks 
should  be  part  of  your  strategy  of  Positive 
SEO.
Thank You

More Related Content

Recently uploaded

Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

How to defend your site from Negative SEO?

  • 2. What is Negative SEO  It  is  the  reverse  version  of  Search  Engine  Optimization.  The  aim  of  SEO  is  to  increase  a  site's  visibility in SERP.  Whereas  Negative  SEO  is  to  reduce  the  site  ranking in search result page.  
  • 3. Why Use Negative SEO? Three main cases:­  To downgrade your competitor's sites.  To  bury  bad  news  about  yourself  of  your  company.  Targeted  Negative  SEO(TNS)  attack  on  the  website.
  • 4. How to defend yourself against Negative SEO  Make  sure  by  checking  Bing  &  Google  Web­master tools regularly.  By  checking  your  email  address  and  react to notifications emails properly.  If  you  are  hit  by  virus  or  malware  try  to  get  your  website  back  to  on­line  as  soon as possible.  Remove potentially damaging material  from  your  website  and  in  social  media  pages  fix  any  pages  that  might  have  bad links on them.
  • 5. If  Distributed  denial  of  services(DDOS)  attack occur means inform to your web host  as  they  can  do  something  to  mitigate  the  damage.  Use  reconsideration  request  if  you  have  been penalized.  Try  to  identify  the  source.  ­  sometimes  of­ fence  is  the  best  defence  and  if  you  can  prove  that  a  competitor  is  damaging  your  websites revenue, you may have grounds to  sue.  Try to develop solid site structure  Clean link profile  Create website design with useful content.
  • 6. How is Negative SEO done  Adding  the  offending  content  into  your site by hacking  Google bowling     This  is  the  technique  designed  to  remove  a  site  from  SERP  my  making Google itself believe that the  site  is  spammy.  Google  bowling  can  be done by following two ways. 1.Adding  link  to  the  site  from  lots  of  bad  neighborhoods  this  link  forms  automatically  generated  spammy  pages.
  • 7. 2. Find a page on your competitors website  which have dynamic URL and hacking that  page by making some changes in their  competitor url like http:mycompetitor.com/index.php?page=11  change this into  http:mycompetitor/index.php?page=12 but  has the same content then this changes will be  showing your site as a vulnerable to google  bowling by URL manipulation.
  • 8. CLICK FRAUD:­       Click  on  the  competitor  website  advertise  to  use  up  to  their  budget  or  limit and affect the number of genuine  visitors  of  them.  But  google  is  really  good to detect these kind of hacking so  no  more  impact  for  this  method  of  Negative SEO.
  • 9. ADSENSE BANNING:­   This is also similar like click fraud that  clicking competitor adverts on their site  many  times  until  the  ad­sense  account  get suspended. 
  • 10. BLACK SOCIAL BOOKMARKING:     Creating  lots  of  bogus  social  media  accounts  like          Face­book,  Twitter,  Google+  by  using  this  creating  and  posting spammy links to target sites.
  • 11. FALSE DUPLICATE CONTENT:­         Getting  content  from  competitor  page  and  post  on  your  page  before  the  competitor  page  crawled  in  google  so  that  your  page  is  1st  crawled  and  that  competitor page considered as a spam.
  • 12. Conclusion The only way to get safe from Negative SEO  is  we  should  update  our  site  by  making  regular  content  reviews  and  back­link  checks  should  be  part  of  your  strategy  of  Positive  SEO.