2 min read

Will Twitter's Business Tools Be Safe and Secure?

Răzvan LIVINTZ

June 02, 2009

Will Twitter's Business Tools Be Safe and Secure?

Normal
0

false
false
false

EN-US
X-NONE
X-NONE

MicrosoftInternetExplorer4

st1:*{behavior:url(#ieooui) }

/* Style Definitions */
table.MsoNormalTable
{mso-style-name:”Table Normal”;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:””;
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:”Calibri”,”sans-serif”;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:”Times New Roman”;
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:”Times New Roman”;
mso-bidi-theme-font:minor-bidi;}

Twitter co-founder, Biz Stone, announced earlier this month
at the Technology Summit in New York that his company is currently focusing on
introducing several features for commercial use, such as analytics and a
directory of commercial accounts that would verify that businesses on Twitter
are legitimate.

The main question that Twitter aficionados and potential
users of these tools must ask themselves in the first place should concern the
capacity of micro blogging platform to deliver safe and secure applications,
especially since stats and data that could affect business are to be involved.

The avalanche of breaches and attacks – ranging from cross-site
scripting vulnerabilities
to worms
attacks
– was augmented last weeks with several interesting approaches. They
could be devastating in case of business information is leaking from the compromised
accounts.

It is worth to mention that the latest miscreants’ endeavors
concentrated particularly on stealing log in credentials, as well as other data
that could facilitate their access to Twitter and similar platforms, such as
e-mail, blogging or e-commerce accounts. Gaining such access translates into a
wide range of e-crime opportunities, from further spam and phishing attempts
(employing the list of followers/friends/contacts) to identity and commercial
data theft or blackmail and extortion.

Most of these phishing attempts relied on social engineering
schemes and speculated the user’s na

tags


Author



Right now

Top posts

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read
Mobile security threats: reality or myth?

Mobile security threats: reality or myth?

June 13, 2021

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

How to keep your Android device immune to malicious vaccine themed apps How to keep your Android device immune to malicious vaccine themed apps
Cristina POPOV

April 22, 2021

2 min read
Facebook Takes Down Two Hacking Groups Operating out of Palestine Facebook Takes Down Two Hacking Groups Operating out of Palestine
Silviu STAHIE

April 22, 2021

2 min read
Ransomware attack causes supermarket cheese shortage in the Netherlands Ransomware attack causes supermarket cheese shortage in the Netherlands
Graham CLULEY

April 13, 2021

2 min read