InvestSMART

How to keep Twitter rogues at bay

One wrong click and your Twitter account could end up in the hands of spammers, especially if you are careless about which applications you let in.
By · 3 Apr 2012
By ·
3 Apr 2012
comments Comments
Upsell Banner

If you're careless about what applications you allow to access your Twitter account, don't be surprised if you find the bad guys are spamming tweets out in your name without your permission.

Here's just a small sample of the messages we saw last week, claiming to link to free iPhone 4 offers or tools to help you find out who had unfollowed your Twitter account.

Some of the messages posted from innocent users' Twitter accounts have claimed that it's easy to get your hands on a free iPhone 4:

 Tweets made by rogue application

Whereas others seem to suggest that they offer a way to easily monitor who has unfollowed you on Twitter. (Which is perhaps an attractive tool after Twitter acknowledge earlier this week that the service was suffering from an"unfollowing bug").

 Tweets made by rogue applications

Rogue applications we have seen sending these messages include:

Unfollow Monitor App v1.0
Who Unfollowed You v2.9
Tweet Statistics App v1.0
Unfollow Stats App v1.3
Tweet Info App 1.3
Twit Stats App v1.2
Unfollow Details App v1.1

If you were unfortunate enough to grant one of these rogue applications access to your Twitter account, revoke its rights immediately by going to the Twitter website, visiting the Settings/Apps option and revoking the offending application's rights.

 Revoke an application's access to your Twitter account

If you're on Twitter and want to learn more about threats, be sure to follow me at @gcluley and the rest of the @NakedSecurity team.

Graham Cluley is a senior technology consultant for Sophos and a writer for Sophos Security blog. You can see his profile and his other work here. 

Share this article and show your support
Free Membership
Free Membership
Graham Cluley - Sophos
Graham Cluley - Sophos
Keep on reading more articles from Graham Cluley - Sophos. See more articles
Join the conversation
Join the conversation...
There are comments posted so far. Join the conversation, please login or Sign up.