Use NBAR to mark the traffic. Then use an ACL blocking 192.168.1.50 to any IP that has that marking.
So, just an example...
class-map match-any CNN
match protocol http url "*cnn.com*"
!
policy-map CONTROL-HTTP
class CNN
set ip dscp 1
!
ip access-list extended 110
permit ip host 192.168.1.50 any dscp 1
!
ip access-list extended DROP
deny ip any any
!
interface lo200
desc *** My Black Hole ***
ip address 200.200.200.200 255.255.255.255
ip access-list DROP in
!
route-map BLACK-HOLE-HTTP
match ip address 110
set ip next-hop 200.200.200.200
!
interface Fa0/0 !(inside int here)
service-policy input CONTROL-HTTP
ip policy route-map BLACK-HOLE-HTTP
end