iTnews

Twitter and Google riddled with malicious links

By SC Australia Staff on Jul 29, 2010 1:09PM

Only 29 per cent of Twitter members are 'true' Tweeters.

Almost three quarters of Twitter's 100 million accounts are unused or responsible for delivering malicious links.

In the 2010 mid-year security report from Barracuda Labs, it analysed more than 25 million Twitter accounts, both legitimate and malicious, and found that true Twitter users (a user that has at least ten followers, follows at least ten people and has tweeted at least ten times) account for only 28.87 per cent of Twitter users

The Twitter crime rate - the percentage of accounts created per month that were eventually suspended for malicious or suspicious activity, or otherwise misused - for the first half of 2010 was 1.67 per cent.

The report also found that Google distributed the most malicious links of four of the most popular online services Bing, Twitter and Yahoo, with 69 per cent of its results poisoned when searches on popular trending topics were performed.

The analysis reviewed more than 25,000 trending topics and nearly 5.5 million search results. The average amount of time for a trending topic to appear on one of the major search engines after appearing on Twitter varies tremendously: 1.2 days for Google, 4.3 days for Bing, and 4.8 days for Yahoo.

See original article on scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
and are google links malicious riddled security twitter with

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity
Building a ransomware remediation backup strategy
Building a ransomware remediation backup strategy

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
By SC Australia Staff
Jul 29 2010
1:09PM
0 Comments

Related Articles

  • Google unravels state-of-art Android and Windows exploit chains
  • Update Chrome or risk remote takeover, US govt warns
  • French watchdog fines Google, Amazon for breaching cookies rules
  • Twitter plans to relaunch 'blue tick' program next year
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra pilots its first neurodiversity recruitment program

Telstra pilots its first neurodiversity recruitment program

Update Chrome or risk remote takeover, US govt warns

Update Chrome or risk remote takeover, US govt warns

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.