New System Can Check for Malware in Twitter URLs

Advertisement
By Indo-Asian News Service | Updated: 26 September 2015 16:02 IST
New System Can Check for Malware in Twitter URLs
Computer scientists from Cardiff University have created an intelligent system to identify malicious links disguised in shortened URLs on Twitter.

The system could identify potential cyber-attacks with up to 83 percent accuracy within five seconds and with up to 98 percent accuracy within 30 seconds when a user clicked on a URL posted on Twitter and malware began to infect the device.

"We are trying to build systems that can help law enforcement authorities make decisions in a changing cyber-security landscape," said principal investigator on the project, professor Omer Rana.

As people are increasingly using social networks such as Twitter to find information about events, the high volume of traffic around large-scale events creates a perfect environment for cybercriminals to launch surreptitious attacks.

The scientists collected tweets containing URLs during the 2015 Superbowl and cricket world cup finals, and monitored interactions between a website and a user's device to recognise the features of a malicious attack.

Advertisement

"Attackers can hide links to malicious servers in a post masquerading as an attractive or informative piece of information about the event," said lead scientist Pete Burnap.

URLs are always shortened on Twitter due to character limitations in posts, so it is incredibly difficult to know which are legitimate, Burnap said.

Advertisement

Once infected the malware can turn your computer into a zombie computer and become part of a global network of machines used to hide information or route further attacks.

"In a 2013 report from Microsoft these 'drive-by downloads' were identified as one of the most active and commercial risks to cyber-security," Burnap said.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Cyber Attack, Internet, Malware, Social, Twitter
Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus 13s Set to Launch in India Tomorrow: Know Price, Specifications
  2. Qualcomm Fixes These Zero-Day Security Vulnerabilities Used By Hackers
  3. Realme 15 5G Could Arrive in These Colourways and Memory Configurations
  4. Vivo X Fold 5 Thickness Compared to iPhone 16 Pro Max in Official Teaser
  5. Samsung Teases 'Ultra' Foldable, May Debut Alongside Galaxy Z Fold 7
  6. ChatGPT Will Now Reference Past Chats to Even Those on the Free Tier
  7. Poco F7 Launch Timeline, Key Specifications Leaked Ahead of Debut
  1. WazirX Restructuring Plan Rejected By Singapore High Court; Crypto Firm to Appeal Decision
  2. Realme 15 5G to Be Available in Four Memory Configurations, Three Colour Options: Report
  3. Tales of Kenzera: Zau Developer Announces Horror Game Dead Take, Pocketpair Set to Publish
  4. Poco F7 Global Launch Timeline Leaked; Indian Variant Tipped to Feature Larger Battery
  5. Reliance, Airtel Group Challenges 'Low' India Satcom Fee Which Can Help Starlink
  6. Samsung Galaxy Z Fold 7, Galaxy Z Flip 7, Galaxy Z Flip 7 FE Colourways, RAM and Storage Options Leaked Ahead of Debut
  7. Australia Limits Crypto ATM Transactions to AUD 5,000 in Bid to Curb Scams, Money Laundering
  8. Google Opens Access to Gemini 2.5 Native Audio Dialog and Controllable Speech Generation in Preview
  9. Vi, Vivo Partner to Offer Vivo V50e Buyers in India an Exclusive 5G Bundled Plan
  10. Google Weather in Search Reportedly Testing AI-Powered Summaries In Some Cities
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.