Twitter 'Honeypots' Lure 30,867 Spammers
With thousands of people flocking to social networking sites each day, a campaign to reduce the ever-increasing spam attacks on Twitter should come as little surprise. What is unusual, however, is where funding for the research needed to crack down on Twitter spammers is coming from: Google.
Google is offering a grant to researchers at Texas A&M University. These researchers intend to trap online evildoers looking to spread malware and phishing software by using "honeypots" (fake twitter accounts) on Twitter.
Spammer Tactics, Behaviors Monitored
Honeypots are generated from a collection of 120,000 real 'tweets' created on Twitter. Their purpose is to help researchers learn about spammer tactics and monitor deviant behavior. Honeypots try not to imitate a real person and are separated from legitimate users. (Source: msn.com)
Said Kyumin Lee, a spokesperson on behalf of the research project: "We have a [a program designed to look up our] profiles. It looks at what [spammers] put in their messages and also accesses their profile to see their demographic information and past updates."
In an effort to appeal to male 'tweeters', spammers were often found to be masquerading as college-aged females from California. The researchers also concluded that social networks like Twitter and Facebook are vulnerable to phishing, because users tend to trust their social networks more due to the widespread use of shortened URLs.
Google Benefits in the Long Run
Of course, Google has something to gain from their investment. In helping the competition rid the world of spammers, Google too will benefit in the long run. As it stands, 61 honeypots were able to lure in and collect information on 30,867 spammers on Twitter alone. The research team has also deployed honeypots on MySpace. (Source: yahoo.com)
Lee hopes that Google will help fund part of a similar campaign on Facebook in the near future.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.