iTnews
  • Home
  • News
  • Technology
  • Security

Twitter slashes spam levels to one per cent

By Rosalie Marshall on Mar 25, 2010 12:29PM
Twitter slashes spam levels to one per cent

Firm says it's winning the war on dodgy tweets.

Twitter claims to have dramatically reduced the amount of spam on its micro-blogging site in the past six months.

The company said that spam levels peaked at nearly 11 per cent of tweets in August 2009, but had been cut to under one per cent by February this year.

Twitter said that engineers from its research team had been working hard to reduce spam, but also called on users to help out in the future by clicking the 'report for spam' link on any suspicious profile page.

This will alert Twitter to the account and block it from following or replying to the user concerned.

"At Twitter, we see spamming as a variety of different behaviours that range from insidious to annoying," said Twitter chief scientist Abdur Chowdhury in a blog post.

"Posting harmful links to phishing or malware sites, repeatedly posting duplicate tweets, and aggressively following and un-following accounts to attract attention are just a few examples of spam on Twitter."

Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
centlevelsonepersecurityslashesspamtotwitter

Partner Content

Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Rosalie Marshall
Mar 25 2010
12:29PM
0 Comments

Related Articles

  • Elon Musk seals US$44 billion deal for Twitter
  • Russian network 'hijacked' Twitter traffic
  • Trolls should not be unmasked if it endangers them, senate committee says
  • Online safety committee tags algorithms, encryption as perilous
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.