IT in Manufacturing


BitDefender offers Twitter spam protection tips

September 2009 IT in Manufacturing

What is the Twitter spam invasion? And how can you prevent it?

With the popularity of social networking platforms such as Twitter on the rise, cyber criminals have found an easy target among unsuspecting users. BitDefender offers tips on how Twitter users can avoid falling prey to some of the most common tricks regularly employed by hackers.

One of the biggest security problems facing Twitter as it relates to the spread of spam and malware are the many link-shortening services

“Another big problem is the fact that search engines - especially Google - index Twitter profiles. This allows malicious pages that are built and marketed with good social engineering tactics to end up high in the rankings,” said Catalin Cosoi, BitDefender senior antispam researcher. “Additionally, because Twitter messages are so short lived, users could unknowingly send spam messages without having the opportunity to notice that someone else is using their account.”

Some of the common types of Twitter spam include:

* Tweet spam: Tweet spam comes from someone a user is currently following and everyone following that user will see the tweet.

</i>* Direct message:</i> A direct message comes from someone a user is currently following and only the user will see the message.

</i>* ReTweet spam:</i> ReTweet spam searches for legitimate tweets and reposts them in the system but with a different, malicious URL.

</i>* Trending subjects spam:</i> Trending subjects spam searches for hot topics on twitter (like Michael Jackson’s death) and posts similar tweets with different, malicious URLs.

</i>* Following spam:</i> Following spam happens when a user’s profile receives a lot of followers he/she does not know. If the user does not start following them back within a week, they stop following the user. Statistics show that one in two users will follow back. Usually these profiles are bots which are programmed to acquire as many followers as possible before they can start broadcasting spam.

Fortunately, Twitter users can protect themselves from falling into spam traps by following five tips:

</i>* Install a comprehensive security solution on your computer - preferably a suite containing antivirus, firewall and a phishing filter.

* Follow the spam profile on Twitter: http://twitter.com/spam. Users can find good advice here. For example, a recent post states: "If you gave your login and password info to TwitViewer, we strongly suggest you change your password now. Thanks!"

* Do not click on all the links you receive.

* Disable the 'auto followback' option. This will allow you to pick and chose who you want to follow.

* Make sure you know who you are following.</i>

“By following these simple tips, users of social networking sites like Twitter can protect themselves from spammers and other cyber criminals,” added Cosoi.

For more information on how to protect yourself from Twitter and other social networking sites, please download our “http://news.bitdefender.com/site/viewPage/multimedia.html podcast or visit the BitDefender website at www.bitdefender.com.

For more information contact Cristina Moline, public relations representative, Bitdefender, 1-800-388-8062, [email protected], www.bitdefender.com





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Why choose between Capex and Opex if you can Totex?
Schneider Electric South Africa IT in Manufacturing
In a sector marked by cyclical demand, high capital intensity, and increasing regulatory and sustainability pressures, mining, minerals and metals (MMM) companies are re-evaluating how they approach procurement and investment.

Read more...
AI and the smart factory
Schneider Electric South Africa IT in Manufacturing
Imagine walking into a factory where machines can think ahead, predict problems before they happen and automatically make adjustments to realise peak performance. This isn’t science fiction, it’s happening right now as AI continues to transform how we run industrial operations.

Read more...
Why your supply chain should be a competitive advantage
Schneider Electric South Africa IT in Manufacturing
The last five years have placed unprecedented strain on global supply chains. Leading companies are turning the challenge into an opportunity to transform their supply chains into a competitive advantage.

Read more...
Why AI will never truly understand machines
Wearcheck IT in Manufacturing
Cutting-edge technology and solutions powered by AI are embraced by specialist condition monitoring company, WearCheck, where the extreme accuracy of data used to assess and diagnose machine health is paramount.

Read more...
Buildings and microgrids for a greener future
Schneider Electric South Africa IT in Manufacturing
Buildings are no longer passive consumers of power. Structures of almost every size are evolving into dynamic energy ecosystems capable of generating, storing and distributing their own electricity. Forming part of this exciting transformation are microgrids.

Read more...
Traditional data centres are not fit for purpose
IT in Manufacturing
Traditional data centre designs are falling short, with nearly half of IT leaders admitting their current infrastructure does not support energy or carbon-reduction goals. New research commissioned by Lenovo reveals that data centre design must evolve to future-proof businesses.

Read more...
AI agents for digital environment management in SA
IT in Manufacturing
The conversation about artificial intelligence in South Africa has shifted rapidly over the past year. Among the technologies changing the pace of business are AI agents - autonomous, task-driven systems designed to operate with limited human input.

Read more...
AI-powered maintenance in future-ready data centres
Schneider Electric South Africa IT in Manufacturing
The data centre marketplace often still relies on outdated maintenance methods to manage mission-critical equipment. Condition-Based Maintenance (CBM) is powered by AI and is fast becoming a necessity in ensuring both competitiveness and resilience.

Read more...
Powering up data centre mega development
IT in Manufacturing
Parker Hannifin has secured a major contract to supply key equipment for nearly 30 aeroderivative gas turbines powering a new hyperscale data centre in Texas.

Read more...
Building resilient supply chains through smarter e-procurement
RS South Africa IT in Manufacturing
In a time of constant disruption, from supply chain uncertainty to rising operational costs, businesses that embrace digital procurement are better positioned to stay competitive and resilient.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved