This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Twitter and Google are riddled with malicious links

Share this article:

Almost three quarters of Twitter's 100 million accounts are unused or responsible for delivering malicious links.

In the 2010 mid-year security report from Barracuda Labs, it analysed more than 25 million Twitter accounts, both legitimate and malicious, and found that true Twitter users (a user that has at least ten followers, follows at least ten people and has tweeted at least ten times) tweet more often and as casual users become more active, malicious activity increases.

It determined that only 28.87 per cent of Twitter users are ‘true Twitter users', and the Twitter crime rate - the percentage of accounts created per month that were eventually suspended for malicious or suspicious activity, or otherwise misused - for the first half of 2010 was 1.67 per cent.

The report also found that Google distributed the most malicious links of four of the most popular online services Bing, Twitter and Yahoo, with 69 per cent of its results poisoned when searches on popular trending topics were performed.

The analysis reviewed more than 25,000 trending topics and nearly 5.5 million search results. The average amount of time for a trending topic to appear on one of the major search engines after appearing on Twitter varies tremendously: 1.2 days for Google, 4.3 days for Bing, and 4.8 days for Yahoo.

Also, over half of the malware found was between the hours of 4:00am and 10:00am GMT and the top ten terms used by malware distributors include the name of a NFL player, three actresses, a Playboy playmate and a college student who faked his way into Harvard.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

VC cyber security funding tops £850 million

VC cyber security funding tops £850 million

A new study from US-based research firm CBI Insights reveals that corporate cyber security investments have risen five-fold since 2009, with 30 percent growth in the last year alone.

Russian/Chinese cyber-security pact raises concerns

Russian/Chinese cyber-security pact raises concerns

News that Russia and China are set to sign a cyber-security treaty next month have left Western cyber experts unsure whether it is a threat or a promising development.

UK police arrest trio over £1.6 million cyber theft from cash machines

UK police arrest trio over £1.6 million cyber ...

London Police have arrested three suspected members of an Eastern European cyber-crime gang who installed malware on more than 50 bank ATM machines across the UK to steal £1.6 million.