Twitter fixes Tweet button issue that downloaded a torrent file
The torrent file is not malicious, Twitter says
IDG News Service - Some Twitter users were surprised Monday when they clicked a button to share content from third-party websites but instead downloaded a mysterious torrent file.
Twitter said the problem, which users said affected websites including TechCrunch.com, FT.com and Businessinsider.com, has been fixed, and the Tweet buttons are now functioning normally.
As is the case when something strange happens, users suspected either Twitter or one of its technology partners had been compromised. Twitter uses several content delivery networks (CDNs) to serve content and improve the site's performance.
Twitter did not indicate the cause of the issue but said in a statement "to our knowledge, the torrent file was not malicious."
A torrent is a small information file that coordinates the download of content on the BitTorrent peer-to-peer file-sharing system. Torrent files are not malicious, but hackers have been known to disguise malware by making their program looks like legitimate files in the hope that people will launch them.
Twitter's sharing buttons are widely used across websites and allow users to easily share a link to content on a website by posting a link to their Twitter feed.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts