tag
Twitter

Ataque de phishing a Twitter

Los ataques de phishing son muy comunes y no se limitan solamente a la obtención de información de índole financiera, motivo por el cual hace un tiempo atrás era muy habitual encontrar clonaciones de sitios web de entidades bancarias, sino que entran en el juego de los atacantes cualquier sitio web que ofrezca servicios y

A Motivation for the Twitter Attack?

Some people are speculating that the motivation for the Twitter attack was to try to silence one person. There are really good signs that the attack against an individual was what took down Twitter, but still we really don’t know. I speculated that it might be a show of force to try to sell botnet

Who Flipped the Bird?

As I write this, Twitter, the popular social networking site is experiencing a distributed denial of service attack. I do not know where the attacks are originating from, or the reason, but it occurs to me there may be hell to pay. So what motives? Perhaps the bad guys are upset that Twitter has recently

Shorteners/Redirectors: short of ideas

We’ve been having some discussion internally about shortened URLs, with specific reference to pointing to web resources on Twitter, where you can’t actually avoid using shortened URLs, because an uncompressed URL is automatically shortened using bit.ly. You may remember that I discussed these issues before here, The main problem, of course, is that it’s all too

ThreatSense.Net® Report for July

Our July ThreatSense.Net® report has been released today, and will eventually be available from the Threat Center page here. Most of the top ten entries are old friends: well, familiar names might be a better way of putting it. One of the disadvantages of having a scanner that makes heavy use of advanced heuristics is

Compressed URLs & Twitter

The Research team in San Diego has several Twitter accounts that we use, both to follow other people and to keep people who follow us informed about hopefully useful stuff like blogs and new papers. http://twitter.com/esetresearch is the official team Twitter account, but we also post stuff to http://twitter.com/ESETLLC and http://twitter.com/ESETblog, which have more followers at

Nothin’ tweet about me

I’m still getting the occasional request to follow on my most obscure Twitter account, which is protected (meaning that I have to approve requests to follow me on there). Sorry, but if I don’t know who you are, you won’t get approved on that one. Even if I do know who you are, you won’t

Facebook: Computeracy by Degrees

When I first went to university at the end of the 1960s (yes, I really am that old, though not quite old enough to be of that generation that only remembers that decade through a haze of psychedelic phenomena), my choice of social sciences was regarded as somewhat fluffy. It was the age of "the

Haciendo dinero (fraudulento) con Twitter

La “ventaja” que tiene Internet actualmente es que cada día surgen nuevas formas de obtener dinero a través del engaño del usuario o usufructuando servicios que hasta este momento habían sido gratuitos. Este es el caso de la venta de dominios o del registro de nombres de usuarios en distintas redes sociales, para luego venderlo

Xbox: Integrating Social Networks

Just a few short days ago I read the announcement that Microsoft announced a new relationship with the social networking services Twitter and Facebook. The relationship was created to enable users of Xbox Live to access their profiles and post photos to their Facebook accounts and allow Twitter users to post and read messages –

Twitter: it’s all about me

I’ve mentioned this before, but I’m still getting quite a lot of requests  to "follow" me on Twitter on an account that’s "protected". So I’m going to explain in a little more detail how this works. Or at least how it works for me… At the beginning of the year, it was suggested that it

Honesty is not The Best Policy for Password Resets

In light of yet another Twitter hack involving a Yahoo email password reset attack, you might think twice about the answers you provide for password reset questions. Common password reset questions include the following: What is your mother’s maiden name? Where were you born? What high school did you graduate from? All of these and

Taking the Mikeyy

Well, Mikeyy may not be the only security problem Twitter has right now, but the Hoodied Bore does seem to be doing an excellent job of exhausting everyone’s patience, including that of The Register’s John Leyden, who described him as "increasingly annoying". It appears that Mr. Mooney did take responsibility for at least the first

Twit of the Year?

I’m guessing that you’ve probably heard about the worm attacks on Twitter over the Easter weekend. Even I did, and I was doing my best to take some time out from work, with rather more success than usual. According to one Michael – sorry, Mikeyy – Mooney, a bored 17-year-old, he was responsible for the

A Twitter Side Issue

Every so often, someone on Twitter finds one of my accounts and tries to follow it. However, that particular account is for a very specific work-related purpose, and I only approve people I work closely with as followers. Sorry! I certainly don’t want to be unfriendly: in fact, I created the @ESETblog account specifically for

The Strange World of Twitter

A number of people have found my Twitter account and asked to "follow" me (that is, receive my micro-blog messages). I have it set up so that no-one can follow me unless I approve the request first, and since the account was set up specifically for work purposes, I normally only approve co-workers. Most of the others,

Falsos perfiles en Twitter propagan malware

Al igual que sucedió con Hi5, FaceBook, Myspace, Orkut, y Unicef, ahora le llego el turno de difundir malware al popular sistema de microblogging, Twitter. Para hacerlo los creadores de malware se valen de la creación de un perfil falso de una cantante muy conocida y a través del mismo intentan que usuarios desprevenidos descarguen

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
08 Aug 2009
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.