IDG News Service - Hoping to deal with a growing problem, Twitter has quietly introduced a feature to prevent users from posting links to malicious Web sites. But security experts say that it can be easily circumvented.
The feature was first noticed Monday by Mikko Hypponen, chief research officer with security company F-Secure. When someone tries to post a link to a malicious Web site, Twitter pops up a short notification saying "Oops! Your tweet contained a URL to a known malware site," and, after a few seconds, deletes the post.
Twitter is using Google Inc.'s Safe Browsing API to check for malicious links, a Google spokesman confirmed Monday.
F-Secure says it's recommended that Twitter start doing this because the site "is increasingly targeted by worms, spam and account hijacking," according to Hypponen's blog post. A month ago, technology entrepreneur Guy Kawasaki's account was misused to post a link to a malicious Web site. In recent weeks users have been hit with links to fake, and sometimes malicious, "rogue" security software.
Security experts said that while Twitter's filtering is a good first step, it still needs some work.
In tests, the feature blocked a URL that led to a phishing site, but it allowed the same link to post if it was shortened using services such as Tinyurl.com or Bit.ly. Because Twitter enforces a strict 140 character limit on each message, these URL shortening services are the most common way of posting links to Twitter.
The filter also permitted the phishing link when the "www" subdomain was stripped from the front of the URL.
Twitter did not return messages seeking comment.
"This is a common problem with this sort of filtering service," said Chris Boyd, director of malware research with FaceTime Security Labs.
However, even if Twitter isn't blocking malicious URLs when they've been shortened, users still get some protection. That's because some of these URL-shorteners use the Google's API themselves. Bit.ly, which is used to post more than half of all Twitter links, uses the API to block people from visiting malicious sites, for example.
Boyd said it will probably take Twitter a while to get its Web filtering up and running properly, "but even some protection is better than none."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts