Tag Archives | twitter




Using Twitter for Data Mining and Information Gathering

We’ve mentioned Twitter a few times lately as it has become a larger and larger part of the social web and the premier ‘micro-blogging’ platform. There was a recent Phishing issue on Twitter and before that Twitter Jacking and a CSRF bug that allowed auto-following. Due to the large update of Twitter, the amount of […]

Topic: Hacking News, Privacy, Social Engineering

Phishing Attacks Hits Twitter Users – Utilising Direct Messages

I personally received the following direct message on Twitter from someone I know quite well: hey! check out this funny blog about you… http://jannawalitax.blogspot.com/ It’s a link to a fake blogspot URL that redirects to a phishing URL for Twitter, it looks the same as the real login page but the actual URL is: http://twitterblogs.access-logins.com/login […]

Topic: Phishing, Web Hacking

Twitter Squatting – The New Domain Jacking?

It seems the latest target for spammers, opportunists and those into Domain Squatting is the registration of interesting or possibly valuable Twitter usernames. Twitter has exploded recently as a new ‘micro-blogging’ platform and it works really well, especially when combined with more traditional blogging and the host of tools that have been build around Twitter […]

Topic: Phishing, Spammers & Scammers

CSRF Vulnerability in Twitter Allows Forced Following

I did mention this earlier in the week when I was talking about Twitter being used as a malware distribution platform, there also seems to be an auto follow vulnerability that spammers would love. Do you remember Myspace and samy with 900,000 friends? Now we have johng77536 on Twitter! Last week, TechCrunch’s Jason Kincaid wrote […]

Topic: Hacking News

Popular Tags

computer-security · darknet · ddos · dos · exploits · fuzzing · google · hacking-networks · hacking-websites · hacking-windows · hacking tool · information gathering · Legal Issues · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · windows · windows-security · Windows Hacking · worms · XSS ·