Tag Archive | "twitter"


17 August 2009 | 13,393 views

Twitter Being Used As Botnet Command Channel

Ah Twitter in the news again, the bad guys sure do keep up with new trends. After being taken offline for a while by a Joejob DDoS attack Twitter is in the news again – this time it’s being used as the command channel for a Botnet. The normal method for controlling Botnets is via [...]

Continue Reading


07 August 2009 | 6,185 views

Twitter & Facebook Taken Offline By DDoS Attacks

Both Facebook and Twitter were hit with pretty severe DDoS attacks rendering them useless and unavailable to the majority of users. The thing is it seems like it wasn’t a traditional network based botnet style DDoS attack, but a ‘joejob‘ attack where spam is sent out containing a link and the users clicking on the [...]

Continue Reading


24 June 2009 | 10,058 views

Twitter Hack Spreads P*rn Trojan

I had a spam tweet appear in my stream a while back and like Guy Kawasaki I also had absolutely no idea where it came from. Perhaps some kinda XSS flaw in Twitter when I visited a site that spawned the message (in a hidden iframe perhaps). It wouldn’t be the first time Twitter was [...]

Continue Reading


05 March 2009 | 9,258 views

Twitter ClickJacking Vulnerability

Click-jacking has hit the news a few times recently with most browsers being susceptible to this kind of redirection attack. This time it’s Twitter that’s being hit, as with anything gaining popularity it’s going to become the focus of more attacks and attempts to compromise its security. It seems like click-jacking may well be here [...]

Continue Reading


22 January 2009 | 11,829 views

Using Twitter for Data Mining and Information Gathering

We’ve mentioned Twitter a few times lately as it has become a larger and larger part of the social web and the premier ‘micro-blogging’ platform. There was a recent Phishing issue on Twitter and before that Twitter Jacking and a CSRF bug that allowed auto-following. Due to the large update of Twitter, the amount of [...]

Continue Reading


05 January 2009 | 4,654 views

Phishing Attacks Hits Twitter Users – Utilising Direct Messages

I personally received the following direct message on Twitter from someone I know quite well: hey! check out this funny blog about you… http://jannawalitax.blogspot.com/ It’s a link to a fake blogspot URL that redirects to a phishing URL for Twitter, it looks the same as the real login page but the actual URL is: http://twitterblogs.access-logins.com/login [...]

Continue Reading


04 November 2008 | 11,302 views

Twitter Squatting – The New Domain Jacking?

It seems the latest target for spammers, opportunists and those into Domain Squatting is the registration of interesting or possibly valuable Twitter usernames. Twitter has exploded recently as a new ‘micro-blogging’ platform and it works really well, especially when combined with more traditional blogging and the host of tools that have been build around Twitter [...]

Continue Reading


11 September 2008 | 4,224 views

CSRF Vulnerability in Twitter Allows Forced Following

I did mention this earlier in the week when I was talking about Twitter being used as a malware distribution platform, there also seems to be an auto follow vulnerability that spammers would love. Do you remember Myspace and samy with 900,000 friends? Now we have johng77536 on Twitter! Last week, TechCrunch’s Jason Kincaid wrote [...]

Continue Reading


05 September 2008 | 3,503 views

Twitter Targeted by Malware Distributors

This one is of interest to me as I do actually use Twitter as a microblogging service and to keep up with what various friends are up to. It’s quite an interesting wep app especially paired with something like Twitterfox in your browser and Twibble in your mobile phone. It must have made it big [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·