Normal
0
false
false
false
EN-US
X-NONE
X-NONE
MicrosoftInternetExplorer4
st1:*{behavior:url(#ieooui) }
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:”Table Normal”;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:””;
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:”Calibri”,”sans-serif”;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:”Times New Roman”;
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:”Times New Roman”;
mso-bidi-theme-font:minor-bidi;}
Twitter co-founder, Biz Stone, announced earlier this month
at the Technology Summit in New York that his company is currently focusing on
introducing several features for commercial use, such as analytics and a
directory of commercial accounts that would verify that businesses on Twitter
are legitimate.
The main question that Twitter aficionados and potential
users of these tools must ask themselves in the first place should concern the
capacity of micro blogging platform to deliver safe and secure applications,
especially since stats and data that could affect business are to be involved.
The avalanche of breaches and attacks – ranging from cross-site
scripting vulnerabilities to worms
attacks – was augmented last weeks with several interesting approaches. They
could be devastating in case of business information is leaking from the compromised
accounts.
It is worth to mention that the latest miscreants’ endeavors
concentrated particularly on stealing log in credentials, as well as other data
that could facilitate their access to Twitter and similar platforms, such as
e-mail, blogging or e-commerce accounts. Gaining such access translates into a
wide range of e-crime opportunities, from further spam and phishing attempts
(employing the list of followers/friends/contacts) to identity and commercial
data theft or blackmail and extortion.
Most of these phishing attempts relied on social engineering
schemes and speculated the user’s na
tags
I rediscovered "all that technical jazz" with the E-Threat Analysis Team at Bitdefender, the creator of one of the industry's most effective lines of internationally certified security software.
View all postsNovember 14, 2024
September 06, 2024