While Twitter can be good for keeping up-to-date on the activities of your pals and colleagues, the micro-blogging service took on a whole new twist in June this year, as tweets from the streets of Tehran flooded Twitter. Frequent Twitter users - and people who hadn't even heard of the microblogging service - were suddenly and simultaneously witnessing its potential.

At the same time, antivirus vendors were warning of new phishing attacks that spread via Twitter. Using Twitter accounts, phishers would follow users and then infect them via a link to a fake profile page laden with malware. Like instant messaging, MySpace, and Facebook before it, Twitter had come of age.

Twitter's meteoric rise in 2009 has been rough. Aside from scaling issues due to the influx of users, in January a hack compromised the accounts of 33 high-profile users, including President Barack Obama, CNN anchor Rick Sanchez, and entertainer Britney Spears.

In April, a Twitter worm known as 'Mikeyy' or 'StalkDaily' surfaced. Twitter shut it down - plus a few follow-up viruses - fairly quickly. Cofounder Biz Stone wrote on the company blog, "Twitter takes security very seriously and we will be following up on all fronts."

Shortened-URL dangers

Parallel to the growth of Twitter is the expansion of URL-shortening services. Fitting your thoughts into 140 characters takes practice; including full URLs is almost impossible. Usually URLs have to be truncated through services such as Bit.ly and TinyURL.com, which also mask the true destination URL and can present their own security problems as a result.

In June, a wave of hidden poisoned URLs swept Twitter, using Bit.ly links to low.cc and myworlds.mp domains where users were asked to download a file to view a video. The file held malware. Bit.ly and TinyURL have been responsive; Bit.ly, for one, now blocks those low.cc and myworlds.mp domains.

At least one security product, ZoneAlarm, blocks access to TinyURL.com by default (you can unblock it). TinyURL has a preview feature, and Firefox has a Bit.ly preview add-on. Some Twitter apps, such as TweetDeck and Tweetie, also preview the URL before you click.

Last month, Avi Raff of RSA had just announced 'A Month of Twitter Bugs', during which researchers plan to disclose a new Twitter vulnerability each day.

Citing previous efforts focused on browsers and on Apple Mac OS vulnerabilities, Raff says his goal is not to break Twitter but to improve it and to address all social networking flaws.

"I hope that Twitter and other Web 2.0 API providers will work closely with their API consumers to develop more secure products." The first disclosed Twitter bug concerned cross-site scripting flaws in Bit.ly. Within hours of the disclosure, Bit.ly corrected them.

Download FREE whitepapers:

Ten tips on security

Make sure your network is secure

PC security advice

Take part in PC Advisor's Broadband Survey 2009

NEXT PAGE: Follow me, please

  1. Think Tweeting is harmless? Think again
  2. Follow me, please


While Twitter can be good for keeping up-to-date on the activities of your pals and colleagues, it's also a hackers dream. We look at the threats web users may encounter when using the micro-blogging service.

Follow me,please

A frequent goal of Twitter users is to build an audience; some people rate their profile a success if it has hundreds or even thousands of followers. A site called TwitterCut advertised that it would dramatically increase your base of followers-if you gave it your user name and password. Most security vendors deemed it a pay-per-click scam.

People who fell for the scam saw their Twitter accounts later used in a phishing attack, in which anyone who visited a link in the tweet wound up downloading a malicious PDF that then attempted to install a fake security product if the PC lacked the latest Adobe security update.

Gone phishing

Most Twitter phishing attempts, however, are more straightforward. Twitter routinely notifies users of recent followers by email, often with a link to the follower's profile. Recent phishing attacks spoof that email and contain a link to a faux Twitter log-on page.

Another variation sends out the tweet, 'Hey, check out this funny blog about you'. Clicking the URL takes the victim to a fake page. No matter how good the site looks, examine the URL, and think twice about entering info-especially if you are already logged in to Twitter.

Bad guys have tried more-subtle tactics, too, such as the porn-name game. According to the game, to create the name you'll use during your adult-film career, you take the name of your first pet and combine it with the street you grew up on, your mother's maiden name, or the model of your car.

Recognise those things? They're common security questions. By tweeting your answers, you could give away access to your Twitter account - or even to your bank account.

Some of the emerging security rules for using Twitter are common sense. Just as you wouldn't leave a phone message saying you'll be out of town, don't tweet your vacation plans.

And please don't share your location if you're a US congressperson going on a confidential overseas trip.

Just ask Representative Pete Hoekstra, who tweeted earlier this year: "Just landed in Baghdad. I believe it may be [the] first time I've had [BlackBerry] service in Iraq".

See also: 10 Facebook & Twitter privacy faux pas

Download FREE whitepapers:

Ten tips on security

Make sure your network is secure

PC security advice

Take part in PC Advisor's Broadband Survey 2009

  1. Think Tweeting is harmless? Think again
  2. Follow me, please