Blog Posts Tagged with "Short URL"


How QR Codes Can Deliver Malware

March 28, 2012 Added by:Robert Siciliano

QR code infections are relatively new. A QR scam works because, as with a shortened URL, the link destination is obscured by the link itself. Once scanned, a QR code may link to an malicious website or download an unwanted application or mobile virus...

Comments  (0)


Twitter Accounts Found Spamming Malicious Links

September 07, 2011 Added by:Headlines

A new spamming campaign has been observed by TrendMicro that is spreading a Worm on Twitter that will add registry entries to a target computer and enable automatic execution. It can then connect to Internet Relay Chat servers to execute remote instructions issued by the attacker...

Comments  (0)


Top Ten Dangerous Internet User Behaviors

July 26, 2011 Added by:Headlines

Call it laziness, or perhaps an unjustified feeling of immunity - the "that will never happen to me" syndrome. Ether way, all the efforts of security experts and vendors are regularly being undone by the risky actions of end-users, and the cyber crooks are capitalizing on this fact...

Comments  (0)


Fifteen Important Social Media Security Tips

July 23, 2011 Added by:Robert Siciliano

Don’t click on short links that don’t clearly show the link location. Criminals often post phony links that claim to show who has been viewing your profile. Test unknown links at by pasting the link into the “View a Site Report” form on the right-hand side of the page...

Comments  (8)


Twitter Scam Hooks Thousands

April 15, 2011 Added by:Robert Siciliano

Twitter’s numbers are astounding. In the physical world, when communities become larger and more densely populated, crime rises. The same applies to online communities. Spammers, scammers, and thieves are paying attention...

Comments  (0)


Cross-Site Scripting (XSS) - Some Examples

January 27, 2011 Added by:Ben Keeley

A reflected XSS vulnerability is when ‘code’ is injected into a website in such a way so as to deliver a payload or to produce a result on the end users browser. Reflected XSS vulnerabilities are delivered to a victim via various means such as an email causing the user to click on a malicious URL...

Comments  (1)