123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Internet Security Personnel Identify Virus, Twitter Users Redirected To Malicious Sites

Profile Picture
By Author: petermartin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In recent times, social networking sites such as Facebook and Twitter have been in the news for hacking attacks, fake identities, identity theft and redirection to fake websites. Cybercriminals have again targeted Twitter with a virus, which redirects users to malicious websites. Internet security researchers have identified that Twitter has been infected with a virus that redirects users, who click on a seemingly legitimate, but fake links embedded in messages to a compromised website of a furniture vendor. The links apparently look like Google news alerts. The malicious links start with the URL: http://goo.gl. Hackers have reportedly infected the website of the furniture vendor and have installed forwarding scripts. When users click on the fake link, they are directed to the website of the furniture vendor. Visitors to that website are automatically redirected to malicious websites loaded with malware.

Attackers may use computers infected with malware to indulge to gain remote access, install botnets, use the computer to send spam e-mails and launch denial of service attacks. ...
... Often, Computer hacking forensics investigators use computer forensic techniques to trace the crime trail.

The malicious links lure Twitter users by apparently offering an easy way to keep track of the followers of their Twitter account. Internet security researchers have identified that messages with malicious links have been transmitted from both existing and new Twitter accounts. Hackers take advantage of the limitation on the Twitter site, which allows users to see only part of a URL in a message. Users are able to identify the full URL only when they click on the link.

Changing lifestyles and the convenience offered by Social networking, professional networking sites and micro-blogging websites have made these sites popular among people. However, loads of personal data available on these sites makes them a breeding ground for cybercriminals. Attackers can create fake identities, impersonate as a colleague or a friend to gain access to confidential information posing a risk to information security. For example, recently attackers created a fake account of Interpol Chief on Facebook to gain access to privileged information regarding their arrested colleagues.

Twitter users must approve new members only after verifying their authenticity. They must be also wary of clicking on suspicious links and advertisements.

Total Views: 228Word Count: 370See All articles From Author

Add Comment

Computers Articles

1. Exploring How Ai In The Cloud Can Transform Your Business
Author: TechDogs

2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs

3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot

4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi

5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown

6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller

7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute

8. Top 7 Advantages Of React Js
Author: Bella Stone

9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone

10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

11. Top 10 Healthcare Technology Trends
Author: goodcoders

12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith

13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press

14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.

15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: