Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Social Networks Technology

Twitter Hit With Second Worm In a Week 97

adeelarshad82 writes "Days after a site update unleashed a Twitter cross-site scripting attack, the micro-blogging site was again hit with a bug that spread via questionable links. The offending messages appeared on a user's Twitter feed with 'WTF:' followed by a link. If you clicked on that link, you were taken to a blank page, but behind the scenes, the worm would post vulgar messages on your account that discussed, well, sex involving goats."
This discussion has been archived. No new comments can be posted.

Twitter Hit With Second Worm In a Week

Comments Filter:
  • by Yvan256 ( 722131 ) on Monday September 27, 2010 @02:51PM (#33714962) Homepage Journal

    What about stopping that stupid cross-domain mess and only allow subdomains to be used? Sure it's going to break a lot of things (including banners...), but it would solve a lot of problems.

  • And as I said above... if I see a link that's immediately followed by some spam about leisure activities with barnyard animals, I'm gonna question that link.

    Playing whack a mole with stuff like antivirus, antispam, antiwhatever suggests your operating system is broken

    I agree that all of the above are a waste of time - you can't keep up. But you also can't blame the OS because it's no more capable of keeping up (unless it's a true walled garden - which works well for some people.) than OS vendors are. My point - and I don't see how it was missed - was that "security" vendors will jump on this bandwagon claiming that they can "fix" this problem when it's a problem that can only be solved via user education.

    (What I didn't say is that's also no solution at all. Users - rightfully I feel - don't want to be educated extensively in security practices when to their perspective they're using a simple tool. )

    The user uses the internet as intended, the developers, not so much.

    I agree. This exploit could just as easily be done without XSS. Someone clicks a link that says "check this out"; which in turn does an HTTP redirect to a GET URL that does the exact same thing. No script required.

    But there's also no OS currently in existence that can prevent this. Users click links, often blindly. Just because it's not fair that they need to do so intelligently doesn't change the fact that they must be responsible for what they click on.

Scientists will study your brain to learn more about your distant cousin, Man.

Working...