Anything 2 Share All - Tips Make money online-Phim-video clip-wallpage-software-picture!

Share for all tip, tut, free picture, film, video clip, wallpage, software, etc...

Twitter: "gold mine" of information technology crime

Image representing Twitter as depicted in Crun...

          Twitter, like the elder went first: instant messaging, MySpace and Facebook, are faced with crime in cyberspace.

            June and then, feeling overwhelmed on Twitter for the world to see what happens on the streets of Tehran, Iran. Although a regular Twitter user, or even less attention to it, past events show the power potential of the genre blog shortly.
But at the same time anti-virus software vendors have warned a new type of phishing email appear on Twitter. Criminal use of information technology Twitter account, enticing users to participate, and injects them false information in the pages filled with malware.
          Twitter, like the elder went first: instant messaging, MySpace and Facebook, to face scammers want to advantage of it. 2009 was a difficult year for Twitter. Besides upgrading the system to meet the number of users increases rapidly, this social networking thing having attacked user account in January. In particular, the account of the 33 rated "superstar" has been hacked, with Barack Obama, Rick Sanchez of CNN, and pop star Britney Spears.
          Then in April, appeared a worm infection "Mikeyy" or "Stalkdaily." Twitter has stopped in time. Then, Biz Stone, Twitter co-founder, the company's blog: "Twitter security seriously and will act on all fronts."
The abbreviated web address: 2 blade knife
Along with the growth, open new Twitter functionality to shorten the URL. By allowing only 140 characters, so content is difficult to give full web address. Tuesday Bit.ly services such as TinyURL or URL address to help cover the truth, but it incurred additional security problems.
Next June, "big wave" has hit danger URL into Twitter, using Bit.ly, a website that provides short address, disguise and myworlds.mp low.cc 2 domain, automatically download malicious file called free-stream-player-v_125.exe (see video). Both 2 and Bit.ly TinyURL service has stopped in time, as this was key 2 domain Bit.ly low.cc and myworlds.mp.
           ZoneAlarm's default settings, personal firewall software, no access to TinyURL, the reason lies in the seed list of toxic sites (however, people can still use TinyURL by removing it from black list). TinyURL is a preview, Firefox, there are add-on "see" inside the address contained nothing Bit.ly. Some additional applications for Twitter, like TweetDeck, Tweetie can help determine where the link leads to before clicking.
           Most recently, in July, Aviv Raff RSA launched "May Twitter bug", during which time researchers will identify new vulnerabilities found on Twitter. Raff said he had no intention "by hook" Twitter, but otherwise, just want to improve the shortcomings of social networking. He said: "I hope Twitter and other Web 2.0 programming library will work closely with developers to secure the 3rd better. Twitter the first error is in the form of XSS Bit.ly. few hours later reveal errors completed Bit.ly patched.

Follow my sisters!
The most obvious target of those who use Twitter is to create a community of "fans" in particular, to evaluate the success based on hundreds or even thousands of people to follow a certain name. A website named twittercut showing that it will significantly increase the number of followers, but only if you have to provide account access and passwords. In fact, the security expert for this trick.
Criminals taking advantage of information technology Twitter account "lightly" use the program to offer compelling video with others. When people go by clicking on the link posted in the tweet, malicious PDF exploit the vulnerability would have on the PC not updated patch.
Technical fraud
             The first time most of the "way" fraud on Twitter is quite simple. Twitter regularly notify new users added to the latest email and links to records of who has joined. But recent phishing emails contain a link to log-in page Twitter fake.
           One way is to send another scam message like: "hey, go check the blog, you really have fun on it." When clicked, it will funnel users to a "trap" log-in, for example: twitter.access - logins.com / login. Regardless of how Web interfaces, check out the best way to access address, and think carefully when entering your information, especially if you're logged in twitter.
               Many other more sophisticated tactics, such as pornographic games. The game requires you to create a user name. Maybe you'll get the name of your first pet and transplant it to you in the street. Or mother's maiden name you. Or car model you like. Do you recognize this? They are questions for password reset it! Hackers would use them to access the Twitter account or your bank account.
              Some basic rules for using Twitter safer based on user awareness. Do not let the phone automatically answers that you are going away, do not reveal the plan as well as holiday resorts for you.

According by PC World

0 comments:

Post a Comment

Thank you for reading this article. Do you have suggestions or how to do better, please leave a few words to share with everyone. Please note you, these comments are not calculated suggestions or help build each other progress will be deleted without notice. In addition, you necessarily have a Google account, or networks are listed below (including OpenID) will be a review. The comment is absolutely not carry political content, reactionary, chửi pool, for that reason, you must have one of the accounts in question.Sorry for the inconvenience. Wish love your home more and more visitors. Content type in Vietnamese will be marked with clear easy to account for more than sympathy.

Donation

Search By Your Customize

Custom Search

Subscription

Enter your email address:

Delivered by FeedBurner

Labels

Sponsored Links

Asd by any program
Free Website Hosting affiliate_link adf.ly - shorten links and earn money!