tag
Twitter

Social Media: Another Survey

The survey asked just two questions:
1.Does your organization have a formal/written social media acceptable use policy?
2.What level of access does your organization allow to each of the follwoing social media sites: Twitter, Facebook, YouTube, LinkedIn, Blogs, and Other?

Library of Congress Acquires Entire Twitter Archive

Since the feed will be public and historic, there is a potential to research trends over the timeline, particularly as twitter is being used for more command and control functionality. As soon as it becomes available, we’ll follow up. :)

Twitter Botnet Update

[Update: Alex Matrosov has posted screenshots of the Twebot update at http://twitpic.com/1ousmx and http://twitpic.com/1ouse5.] Juraj Malcho, the Head of our Lab in Bratislava, reports that there have been further developments regarding the tool for creating Twitter-controlled bots described by Jorge Mieres and Sebastián Bortnik, Security Analysts at ESET Latin America, in an earlier blog at http://www.eset.com/blog/2010/05/14/botnet-for-twits-applications-for-dummies.

Botnet a través de Twitter

A lo largo del tiempo se han conocido muchos casos e incidentes de seguridad donde los actores principales son las botnets, y cuyo proceso de reclutamiento de equipos infectados centra sus esfuerzos en explotar las tecnologías con mayor popularidad, entre las que hemos destacado las redes sociales. Incluso casos donde la comunicación entre el botmaster

Botnet for Twits, Applications for Dummies

Our colleagues in ESET Latin America have just blogged about an interesting botnet creation tool: the original blog is at http://blogs.eset-la.com/laboratorio/2010/05/14/botnet-a-traves-twitter/, by Jorge Mieres and Sebastián Bortnik, Security Analysts. (Mistakes in interpretation are, as usual, down to me!) In the last years we have seen many security incidents driven by botnets and exploiting the technologies

Correos falsos de Twitter ofrecen Viagra

En los últimos días se están haciendo masivos distintos tipos de correo spam que dicen provenir de Twitter pero que en realidad poseen enlaces a sitios de venta de productos farmacéuticos. Por ejemplo en el siguiente correo se puede ver claramente el engaño: Como puede verse dice haber sido enviado por “Twitter Support  de support@twitter.com”

Some possibly interesting links and a very old new paper

If you regularly follow my blogs, you'll know that while this my primary blogspot, it isn't the only site to which I post (see signature for full details). Here are a few recent blogs and microblogs that may be of possible interest. @Mophiee asked me about the ICPP Trojan on Twitter (where I'm @ESETblog or

Here Come (more of) The Ghouls

[Update: it's likely that the attacks described below will also take advantage of the more recent bombings in Dagestan, as described by the BBC here. Isn't it bad enough that horrors like this take place at all, let alone provide revenue for cybercriminals?] Late last  night (30th March) I added a pointer to my earlier

Campaña de infección utilizando la bomba en Moscú como excusa

Desde el Laboratorio de Análisis e Investigación de ESET Latinoamérica hemos detectado una importante campaña de infección a través de la red de microblogging Twitter y buscadores, mediante la cual se intenta propagar distintos códigos maliciosos. En el primer caso, la estrategia consiste en utilizar perfiles maliciosos de Twitter para publicar direcciones web supuestamente relacionadas

A Bit More on PleaseRobMe

Yesterday I recorded a podcast for The Malware Report with guest Ira Victor of Data Clone Labs Inc. Ira also co-hosts the radio show “The Cyber Jungle” which you can find at www.thecyberjungle.com. The podcast should be up in the next week or so. During the show Ira mentioned the website http://www.PleaseRobMe.com. This site takes

PleaseRobMe

We seem to have pointed out rather often recently that giving away lots of information on Facebook, Twitter and other social network sites isn't a good idea. PleaseRobMe claims, somewhat amusingly, to be a resource for burglars, saving them the trouble of searching through Twitter and Foursquare for information on whose house is currently unoccupied. In

Ten Ways to Dodge Cyber-Bullets (Part 6)

[Part 6 of an occasional series, updating a blog series I ran in early 2009 to reflect changes in the threat landscape. This series will also be available shortly as a white paper.] Social Networks Can Be Very Anti-Social Don’t disclose sensitive information on websites like FaceBook or LinkedIn if you can’t be sure that you

Twitter and I

I just received another request to follow me on Twitter on a protected account, so perhaps it's time I clarified what all those accounts that are and aren't in my signature are for. @dharleyatESET is a protected account largely for work purposes.  I only accept requests to follow from people who really need to know

Nice Smartphone, Mr. Darcy: Fact, Fiction & the Internet

OK, I'll save the novel for another time. However, there's a rather less ambitious snippet of my recent writing at http://www.eurograduate.com/article.asp?id=3015&pid=1, an article called "Fact, Fiction and the Internet," and, further to some of my recent posts here, touches on the dangers of social networking. Though you might think that someone with as many twitter

Falso Twitter con el mensaje "hi. this you?? LOL."

Hace instantes hemos encontrado decenas de Twit con el mensaje “hi. this you?? LOL.” y con un enlace que dirige al usuario a un sitio falso de Twitter que solicita las credenciales de login: Por supuesto se trata de un caso de phishing a través de Twitter y con el objetivo claro de robar usuarios

Shortened URLs

Now here's a useful link (thanks to Mikko Hypponen for the tweet that brought it to my attention). I've made the point several times here about being cautious about URLs shortened by bit.ly, tinyurl and the many others. Which is why when I flag our blogs and papers on twitter, I normally use tinyURL or

Spam en Twitter

En el día de hoy hemos hallado una gran cantidad de mensajes similares en Twitter promocionando sitios fraudulentos sobre trabajos en línea y productos farmacéuticos. Los mensajes y dominios promocionados se pueden ver en la siguiente captura: Todos los usuarios que promocionan estos trabajos falsos han sido recientemente creados y todos ellos tienen pocos seguidores

Another Twitter Security Problem

As reported at http://www.eweek.com/c/a/Security/Twitter-XSS-Vulnerability-Still-Wide-Open-Developer-Says-433005/, a researcher has found a cross site scripting vulnerability that affects Twitter. The researcher claims that by exploiting this he could gain access to the Twitter accounts of anyone who views his specially crafted tweets. The explanation of the problem is a bit techie, but there is a very key point

Armor for Social Butterflies

I was speaking with our friend David Perry at Trend Micro about the insecurity of social networking services and what steps users could take to strengthen their security online. In the course of our conversation, we came up with a list of simple steps you could take to better protect yourselves. Be careful about whom you

Reporte de amenazas de Agosto

Durante el mes de Agosto se ha producido un importante caudal de incidentes en materia de malware del cual destacamos, a continuación, los de mayor repercusión entre los usuarios: Durante los primeros días del mes, los atacantes focalizaron sus esfuerzos contra una de las redes sociales de microblogging más populares: Twitter, transformándola en el blanco

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
04 Aug 2010
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.