Google's Wave technology, which was announced at the company's I/O conference in May, is billed as a the successor to email.
The online technology - which also supports limited offline functionality - is said to merge email, instant messaging, wiki and social networking technology into an interactive multi-user conferencing system that does not operate in real time.
The service, which was released to 100 000 beta test users at the start of this month, is already generating headlines and, says Amichai Shulman, CTO of Imperva, the data security consultancy, will attract the interests of malware developers.
"Reports are already coming in of criminal hackers poisoning Google search results and you can expect similar scams to be pulled by hackers intent on routing internet users to infected websites," he said.
"This will almost certainly be achieved by hacking into large numbers of web servers and injecting malware references into the system. The process will be automated using botnets, which will target SQL injection vulnerabilities in web applications".
According to Shulman, the irony of this attack scenario is that, in order to deduce which servers to target, the hackers will probably use Google to search them out.
The second stage of the attack methodology, he explained, is to promote pages infected with malware by hacking into web applications - which are mostly PHP-driven - and creating a revised index that includes link to the malware-infested pages.
The problem facing the internet industry, he went on to say, is that although companies tend to dismiss the chance of their applications being hacked due to a lack of public interest, this is not going to be the case with Google Wave search infections.
"Contemporary hacking campaigns are highly sophisticated and are engineered to select popular search terms on Google, and infect every possible related vulnerable target", he said.
"The net result of this is that although Google itself is relatively impervious to hacking attacks, the weaknesses of ancillary web search result supporting technologies makes it possible to subvert user clickthroughs to land on infected pages," he added.