IT in Manufacturing


BitDefender offers Twitter spam protection tips

September 2009 IT in Manufacturing

What is the Twitter spam invasion? And how can you prevent it?

With the popularity of social networking platforms such as Twitter on the rise, cyber criminals have found an easy target among unsuspecting users. BitDefender offers tips on how Twitter users can avoid falling prey to some of the most common tricks regularly employed by hackers.

One of the biggest security problems facing Twitter as it relates to the spread of spam and malware are the many link-shortening services

“Another big problem is the fact that search engines - especially Google - index Twitter profiles. This allows malicious pages that are built and marketed with good social engineering tactics to end up high in the rankings,” said Catalin Cosoi, BitDefender senior antispam researcher. “Additionally, because Twitter messages are so short lived, users could unknowingly send spam messages without having the opportunity to notice that someone else is using their account.”

Some of the common types of Twitter spam include:

* Tweet spam: Tweet spam comes from someone a user is currently following and everyone following that user will see the tweet.

</i>* Direct message:</i> A direct message comes from someone a user is currently following and only the user will see the message.

</i>* ReTweet spam:</i> ReTweet spam searches for legitimate tweets and reposts them in the system but with a different, malicious URL.

</i>* Trending subjects spam:</i> Trending subjects spam searches for hot topics on twitter (like Michael Jackson’s death) and posts similar tweets with different, malicious URLs.

</i>* Following spam:</i> Following spam happens when a user’s profile receives a lot of followers he/she does not know. If the user does not start following them back within a week, they stop following the user. Statistics show that one in two users will follow back. Usually these profiles are bots which are programmed to acquire as many followers as possible before they can start broadcasting spam.

Fortunately, Twitter users can protect themselves from falling into spam traps by following five tips:

</i>* Install a comprehensive security solution on your computer - preferably a suite containing antivirus, firewall and a phishing filter.

* Follow the spam profile on Twitter: http://twitter.com/spam. Users can find good advice here. For example, a recent post states: "If you gave your login and password info to TwitViewer, we strongly suggest you change your password now. Thanks!"

* Do not click on all the links you receive.

* Disable the 'auto followback' option. This will allow you to pick and chose who you want to follow.

* Make sure you know who you are following.</i>

“By following these simple tips, users of social networking sites like Twitter can protect themselves from spammers and other cyber criminals,” added Cosoi.

For more information on how to protect yourself from Twitter and other social networking sites, please download our “http://news.bitdefender.com/site/viewPage/multimedia.html podcast or visit the BitDefender website at www.bitdefender.com.

For more information contact Cristina Moline, public relations representative, Bitdefender, 1-800-388-8062, cmoline@bitdefender.com, www.bitdefender.com





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Industrial Ethernet switches reflect ongoing evolution at the IIoT ‘thin edge’
January 2020 , IT in Manufacturing
Today’s digital transformation strategies require data connectivity throughout the architecture to fulfil the quest for improved operations.

Read more...
RS Components introduces 4ZeroBox IIoT development system
January 2020, RS Components SA , IT in Manufacturing
RS Components has introduced the 4ZeroBox IIoT unit from Italian manufacturer TOI. 4ZeroBox is the hardware component of TOI’s 4ZeroPlatform, a plug-and-play data gathering, processing and reporting system ...

Read more...
IFS study reveals AI investments looming on the business horizon
January 2020 , IT in Manufacturing
Global enterprise applications company, IFS, has announced the findings of a research study into the attitudes and strategies towards artificial intelligence (AI) among business leaders. The study polled ...

Read more...
New Mindsphere app from Siemens
January 2020, Siemens Digital Industries , IT in Manufacturing
With Predictive Services for Drive Systems, Siemens presents a standardised extension to local service agreements. Based on the new Mindsphere Predictive Service Assistance app, it makes maintenance more ...

Read more...
Schneider Electric brings digital competence to mining applications
January 2020, Schneider Electric South Africa , IT in Manufacturing
Schneider Electric is dedicated to the deployment of digital technologies in mining to address the rising pressures on business sustainability and reduced energy consumption. “The organisation has invested ...

Read more...
Micromine assists mining operations in the Industry 4.0 era
January 2020 , IT in Manufacturing
Global trends such as Industry 4.0 are transforming the traditional methods deployed to extract ore from rock. Mining operations are instead looking at innovations such as automated drilling in high risk ...

Read more...
11th annual MESA Africa conference
January 2020 , IT in Manufacturing
I recently attended the MESA conference held at the Zulu Inyala Country Manor.

Read more...
Digital twin allows process simulations
December 2019, Siemens Digital Industries , IT in Manufacturing
The high-tech company Grenzebach’s portfolio includes the simulation of material flow in complex plants in the glass industry, which it achieves using Siemens simulation solutions. Together, the two companies ...

Read more...
Game-changing digital solutions for mines
December 2019, SKF South Africa , IT in Manufacturing
With digitalisation creeping into the mining industry and transforming day-to-day operations, this sector is enhancing its Industry 4.0 operation and process compliancy. As a preferred supplier of premium ...

Read more...
Protect critical infrastructure and manufacturing plants
December 2019 , IT in Manufacturing
As manufacturers around the world analyse and embrace the importance of being more connected to the IIoT, cybersecurity experts caution that the benefits of being interconnected come with a warning, and ...

Read more...