Twitter Spam

Twitter‘s habit of falling foul to phishing attacks may have come to an end this week as the company announced that it’s stepping up its efforts to eliminate malicious attacks with some new features, described as being able to “detect, intercept, and prevent the spread of bad links before they reach an intended victim.”

According to net security firm Sophos, social networking spam and malware attacks rose 70 per cent last year, with Facebook and Twitter in particular becoming prime targets for Web 2.0 spammers.

More recently, bogus direct messages have invited users to log into counterfeit Twitter sites, and hand over login credentials in the process. Hacked accounts have subsequently sent spam messages, much to the embarrassment of the victims of the attack, including cabinet minister Ed Miliband, online bank First Direct and BBC correspondent Nick Higham.

In news that will be welcomed by the thousands of Twitter users who have fallen prey to such an attack, the popular micro blogging site has decided to fight back.

How does it work? Quite simply, even if a bad link is already sent out in an email notification and somebody clicks on it, Twitter will be able to keep that user safe. The system is similar to current Gmail security, which automatically checks link destinations, and works by all submitted links being routed to this new service.

Aside from the obvious benefits these new measures bring for the celebrity user and average Twitter fan, businesses will undoubtedly benefit from this extra level of protection. A vast majority of companies are signed-up to the service because on the plus side, Twitter is an effective tool in which to market their brand, giving them the ability to continually and repeatedly promote their products and services to a large audience. On the negative side, if a business falls prey to an embarrassing, or in some cases, damaging phishing attack, a company has left itself open and vulnerable for the masses to see. But is this really the last we will see of Twitter spam attacks?

© Twitter Logo

© Paolo Massa “tag spam” Photo. Attribution 2.0 Generic

Reblog this post [with Zemanta]

Latest Posts

A B2B buying decision rarely happens with one person. It’s usually a buying group with different roles, risks, and opinions, and the deal moves when your champion can explain the choice internally. That’s why forwardability matters more than engagement.
Read More
Design and disability are so often discussed in terms of basic “accommodation” and “access,” yet my visit to the V&A’s Design and Disability exhibition completely shifted that perspective. Rather than framing disability as an issue to be fixed, the exhibition presents it as a culture, a rich set of identities, and a radical design force shaping practice from the 1940s right up to today.
Read More
Lurkers are your biggest audience and they’re deciding in silence. They watch in feeds, sanity-check you in comments, communities and reviews, then repeat whatever proof is easiest to quote internally. That’s why social feels harder, it’s no longer a click machine, it’s an answer surface. Ofcom shows AI summaries are now common in search results, and YouTube remains the UK’s biggest social utility by reach and time spent. If your story is inconsistent, your evidence is scattered, or your customer proof is buried, lurkers can’t do the job of trusting you for you.
Read More