Despite the increasingly popular Twitter, Microblogging site has limitations in doing sharing website with a long URL. This is because the sharing status of this website is permitted only as many as 140 characters. The only way to shorten the link is to use utilities shortening URLs (URL-shortening). One example of these utilities is bit.ly. With these tools the user can insert a link in the 140-character limit, which will direct anyone who clicks on the URL to a longer URL and destination websites.
There is one weakness in here from a security standpoint, a person often does not know where a link leads until he clicks on the link. Clicking the link in this way really is a desperation in terms of security.
Unfortunately, malware makers have capitalized on this. Researchers at Symantec Security Response has been observed that the virtual world of criminals using the shortened URL is to distribute misleading applications. By using seductive tweet and Twitter search term commonly used, they aim to encourage other users to click on the links are shortened so that they become victims of a malicious program.
Both Twitter and URL shortening service can not be blamed for this problem. This is only one other case in which the evil attacker uses a neutral technology as a tool for fraudulent purposes. Since both services are convenient technology rapidly growing, how do you protect yourself?
The good news is Firefox or Internet Explorer browser to offer plug-ins that can check a shortened URL and show the last URL before the user clicks on the URL. Although he could not confirm whether the link is bad, at least with the browser plug-in users will be more careful before clicking. Although misleading applications currently offered in this way is very similar, we will see more variation in the future.
Advice for consumers:
• Be careful what you click. Avoid clicking on the URL posted by Twitter user unknown
• Use safe online habits. Do not accept or open the error dialog from within a Web browser and keep the software and security patches up to date.
• Buy software from trusted sources. Watch out with ads that promote the security or performance tools that a system very similar to the Microsoft Windows standard alerts.
• Apply protection. Equip yourself with strong security software and updated to capture and download malware prevention.
There is one weakness in here from a security standpoint, a person often does not know where a link leads until he clicks on the link. Clicking the link in this way really is a desperation in terms of security.
Unfortunately, malware makers have capitalized on this. Researchers at Symantec Security Response has been observed that the virtual world of criminals using the shortened URL is to distribute misleading applications. By using seductive tweet and Twitter search term commonly used, they aim to encourage other users to click on the links are shortened so that they become victims of a malicious program.
Both Twitter and URL shortening service can not be blamed for this problem. This is only one other case in which the evil attacker uses a neutral technology as a tool for fraudulent purposes. Since both services are convenient technology rapidly growing, how do you protect yourself?
The good news is Firefox or Internet Explorer browser to offer plug-ins that can check a shortened URL and show the last URL before the user clicks on the URL. Although he could not confirm whether the link is bad, at least with the browser plug-in users will be more careful before clicking. Although misleading applications currently offered in this way is very similar, we will see more variation in the future.
Advice for consumers:
• Be careful what you click. Avoid clicking on the URL posted by Twitter user unknown
• Use safe online habits. Do not accept or open the error dialog from within a Web browser and keep the software and security patches up to date.
• Buy software from trusted sources. Watch out with ads that promote the security or performance tools that a system very similar to the Microsoft Windows standard alerts.
• Apply protection. Equip yourself with strong security software and updated to capture and download malware prevention.
0 comments
Post a Comment