IT in Manufacturing


BitDefender offers Twitter spam protection tips

September 2009 IT in Manufacturing

What is the Twitter spam invasion? And how can you prevent it?

With the popularity of social networking platforms such as Twitter on the rise, cyber criminals have found an easy target among unsuspecting users. BitDefender offers tips on how Twitter users can avoid falling prey to some of the most common tricks regularly employed by hackers.

One of the biggest security problems facing Twitter as it relates to the spread of spam and malware are the many link-shortening services

“Another big problem is the fact that search engines - especially Google - index Twitter profiles. This allows malicious pages that are built and marketed with good social engineering tactics to end up high in the rankings,” said Catalin Cosoi, BitDefender senior antispam researcher. “Additionally, because Twitter messages are so short lived, users could unknowingly send spam messages without having the opportunity to notice that someone else is using their account.”

Some of the common types of Twitter spam include:

* Tweet spam: Tweet spam comes from someone a user is currently following and everyone following that user will see the tweet.

</i>* Direct message:</i> A direct message comes from someone a user is currently following and only the user will see the message.

</i>* ReTweet spam:</i> ReTweet spam searches for legitimate tweets and reposts them in the system but with a different, malicious URL.

</i>* Trending subjects spam:</i> Trending subjects spam searches for hot topics on twitter (like Michael Jackson’s death) and posts similar tweets with different, malicious URLs.

</i>* Following spam:</i> Following spam happens when a user’s profile receives a lot of followers he/she does not know. If the user does not start following them back within a week, they stop following the user. Statistics show that one in two users will follow back. Usually these profiles are bots which are programmed to acquire as many followers as possible before they can start broadcasting spam.

Fortunately, Twitter users can protect themselves from falling into spam traps by following five tips:

</i>* Install a comprehensive security solution on your computer - preferably a suite containing antivirus, firewall and a phishing filter.

* Follow the spam profile on Twitter: http://twitter.com/spam. Users can find good advice here. For example, a recent post states: "If you gave your login and password info to TwitViewer, we strongly suggest you change your password now. Thanks!"

* Do not click on all the links you receive.

* Disable the 'auto followback' option. This will allow you to pick and chose who you want to follow.

* Make sure you know who you are following.</i>

“By following these simple tips, users of social networking sites like Twitter can protect themselves from spammers and other cyber criminals,” added Cosoi.

For more information on how to protect yourself from Twitter and other social networking sites, please download our “http://news.bitdefender.com/site/viewPage/multimedia.html podcast or visit the BitDefender website at www.bitdefender.com.

For more information contact Cristina Moline, public relations representative, Bitdefender, 1-800-388-8062, [email protected], www.bitdefender.com





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Schneider Electric’s Five-Pillar Strategy takes the guesswork out of equip
Schneider Electric South Africa IT in Manufacturing
Schneider Electric’s Field Service Cycle, otherwise known as the Five-Pillar Strategy, is a structured approach to managing the lifecycle of equipment to prolong asset lifespan while reducing the total cost of ownership for customers.

Read more...
Enhancing operational safety and efficiency through advanced risk-based modelling
IT in Manufacturing
Now, more than ever, capital and operational cost can be reduced while enhancing operational safety and increasing production uptime by applying transformative methods such as Computational Fluid Dynamics modelling.

Read more...
Laying the groundwork in IT/OT
IT in Manufacturing
In the realm of manufacturing, the core mandate is to deliver value to stakeholders. For many in the industry, this is best achieved through a risk-averse approach. Only upon establishing a robust foundation should a business consider venturing into advanced optimisation or cutting-edge technological innovations such as industrial AI.

Read more...
Looking into the future of machine vision
Omron Electronics IT in Manufacturing
Artificial intelligence (AI) is driving a significant transformation in all areas of industrial automation, and machine vision is no exception. Omron’s AI-powered machine vision systems seamlessly integrate state-of-the-art algorithms, enabling machines to analyse and interpret visual data meticulously.

Read more...
Driving digital transformation in the truck industry
Siemens South Africa IT in Manufacturing
Tatra Trucks, a leading truck manufacturer in Czechia, has adopted the Siemens Xcelerator portfolio of industry software including Teamcenter software for product lifecycle management and the Mendix low code platform to help increase production volume and strengthen its ability to manufacture vehicles that meet specific customer requirements.

Read more...
Opinion piece: Digital twins in manufacturing – design, optimise and expand
Schneider Electric South Africa IT in Manufacturing
Digital twin technology can help create better products, fast. It can also transform the work of product development. This strong statement from McKinsey reinforces how far digital twins have come in manufacturing.

Read more...
Asset tracking is key to driving operational excellence and sustainable growth
Schneider Electric South Africa IT in Manufacturing
Asset tracking plays a critical role in the success of industrial businesses. By effectively managing and monitoring assets, companies can optimise their operations, ensuring that resources are used efficiently. This leads to improved productivity and reduced costs.

Read more...
Siemens democratises AI-driven PCB design for small and medium electronics teams
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software is making its AI-enhanced electronic systems design technology more accessible to small and mid-sized businesses with PADS Pro Essentials software and Xpedition Standard software.

Read more...
Predicting and preventing cyber-attacks with AI and generative AI
IT in Manufacturing
The speed at which cyber threats are evolving is unprecedented. As a result, companies need to implement state-of-the-art technology to protect their data and systems.

Read more...
Real-world lessons in digital transformation
IT in Manufacturing
Synthesis has helped businesses across multiple industries with their digital transformation by solving their unique integration challenges.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved