Error opening template: advertisement/zones/468x60_generic.tplError opening template: advertisement/zones/728x90_leaderboard.tplError opening template: advertisement/zones/728x90_bottom_ad.tplError opening template: advertisement/zones/300x250_right_ros_up.tplError opening template: advertisement/zones/300x250_right_ros_down.tplError opening template: advertisement/zones/160x600_left_nav.tplError opening template: advertisement/zones/160x600_right_nav.tpl Types of Spamming on Twitter

Types of Spamming on Twitter

Spam on Twitter has become a growing problem and with more and more individuals and businesses using the social networking service, it is expected that spam will continue to be on the rise. In addition, Twitter is an open application programming interface (API) and it does not require a valid email address when you are creating an account which further increases the risk of spam.

There are many different ways that spammers operate on Twitter with more methods on the horizon as Twitter continues to grow. To give you a general idea of how spammers operate, here are a few different methods they use.

Short URLs

Although businesses promote their products through a subtle approach, spammers blatantly promote their business opportunities or scams on Twitter through the use of short URLs. Short URLs are used frequently due to the 140 character limit on tweets so; it is impossible to tell if the link is a scam or contains a virus, Trojan, or other type of malware.

Hijacking

Hackers can hijack Twitter accounts by breaking into the account and using it to send out spam. Hackers usually target accounts that have an extensive list of followers so they can send out spam. This usually includes the accounts of famous people but it can happen to any Twitter user. One way around this is to avoid using passwords that hackers can easily guess but like everything else, there is no guarantee.

Hash Tags on Trend Topics

Trending topics on Twitter are topics that are currently popular on Twitter. Spammers exploit the trending topic by adding a hash tag to a popular keyword in their tweet that is related to the trending topic. As a result, spammers increase the visibility of their tweets because they show up more often in popular searches.

Tweetjacking

Tweetjacking occurs when spammers reply to tweets by replying to your @username. When they reply or retweet the messages appear in your timeline. Often the messages contain a short URL that replaces your URL and leads clickers to a porn site or, worse yet, a site laced with malware.

Follower Fraud

The success of your Twitter account is partially dependent upon the number of people that are following you. As mentioned earlier, creating an account is very easy which encourages spammers to automate the process and collect a massive amount of counterfeit followers. The spammer then turns around and attempts to sell the account for a good amount of money and repeat the process to cultivate their spam group.

Twitter provides instructions on their site on how to report spam and abuse. There are also a number of Twitter spam applications such as TwitBlock and TwerpScan that will help you block spam and they are free for the asking.

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
Identity theft comes in many forms.

A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.

Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.

There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:

*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.