Twitter and Google riddled with malicious links

Powered by SC Magazine
 

Only 29 per cent of Twitter members are 'true' Tweeters.

Almost three quarters of Twitter's 100 million accounts are unused or responsible for delivering malicious links.

In the 2010 mid-year security report from Barracuda Labs, it analysed more than 25 million Twitter accounts, both legitimate and malicious, and found that true Twitter users (a user that has at least ten followers, follows at least ten people and has tweeted at least ten times) account for only 28.87 per cent of Twitter users

The Twitter crime rate - the percentage of accounts created per month that were eventually suspended for malicious or suspicious activity, or otherwise misused - for the first half of 2010 was 1.67 per cent.

The report also found that Google distributed the most malicious links of four of the most popular online services Bing, Twitter and Yahoo, with 69 per cent of its results poisoned when searches on popular trending topics were performed.

The analysis reviewed more than 25,000 trending topics and nearly 5.5 million search results. The average amount of time for a trending topic to appear on one of the major search engines after appearing on Twitter varies tremendously: 1.2 days for Google, 4.3 days for Bing, and 4.8 days for Yahoo.

See original article on scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
What InfoSec can learn from the insurance industry
[Blog post] Another way data breach laws could help manage risk.
 
A ten-point plan for disrupting security
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1029

Vote