DMCA
Nothing Micro About Micro-Blogging By Macky Cruz Monthly Threat Roundup (2009)
BibTeX
@MISC{09nothingmicro,
author = {},
title = {Nothing Micro About Micro-Blogging By Macky Cruz Monthly Threat Roundup},
year = {2009}
}
OpenURL
Abstract
More than a micro-blogging service that lets users create and read other people’s “tweets ” (text posts or updates that are up to 140 characters in length), Twitter fosters both real-life and online relationships. Tweets can range from the mundane to the life threatening. Some see Twitter as a productivity, lifestyle, or even work aid. Twitter profiles can be created for individuals, organizations, celebrities, athletes, companies, and movements—any conceivable entity that wants to establish a real-time feel to its online presence. While incredibly useful and addictive for most, Twitter has had its share of attacks and history of abuse (see Figure 2). Restrictions in avenues that can be used to post updates (like free SMS and instant-messaging [IM] service) have not stopped the explosive growth of Twitter profiles all over the world (see Figure 3). Cybercriminals, however, are close on its heels. Spoofing, Hacking, and Other Authentication Issues In early 2007, Nitesh Dhanjani first reported via his blog a scenario that could instigate malicious activities related to Twitter’s services. By using an SMS application called FakeMyText, he was able to post a tweet on a target user’s profile without the owner’s knowledge. An attacker, however, needs to know a target’s phone number to post an unauthorized tweet. While this was a valid and correctable oversight on the part of the application’s creators, the highly publicized hacking of over 30 popular Twitter accounts was largely more avoidable. Hackers simply guessed a Twitter administrator’s password
Keyphrases
macky cruz monthly threat roundup nothing micro twitter profile application creator conceivable entity correctable oversight nitesh dhanjani publicized hacking life threatening unauthorized tweet authentication issue popular twitter account micro-blogging service free sm online presence target user profile online relationship twitter administrator password people tweet sm application explosive growth twitter service real-time feel malicious activity text post user create target phone number owner knowledge instant-messaging im service work aid