Home » Social Media » New System Can Check For Malware In Twitter URLs

New System Can Check For Malware In Twitter URLs

Computer scientists from Cardiff College have created a brilliant system to recognize malicious links concealed in shortened Web addresses on Twitter.

The system could identify likely cyber-attacks with up to 83 percent precision within five seconds is actually up to 98 % accuracy within 30 seconds if a user clicked with a URL posted in Twitter and malware begun to infect the system.

New System Can Check For Malware In Twitter URLs

New System Can Check For Malware In Twitter URLs
New System Can Check For Malware In Twitter URLs

“We are wanting to build systems that will help law enforcement regulators make decisions in a changing cyber-security landscaping, ” said principal investigator about the project, professor Omer Rana.

Read More: Twitter Testing New Way To Poll Users On Desktop And Mobile

As people are increasingly using myspace such as Twitter to discover information about occasions, the high amount of traffic around large-scale events creates a perfect environment for cybercriminals to be able to launch surreptitious assaults.

The scientists compiled tweets containing URLs over the 2015 Superbowl and cricket world pot finals, and monitored interactions between an internet site and a user’s device to learn the features of your malicious attack.

“Attackers can hide links to malicious servers in a post masquerading for attractive or informative part of information about the event, ” said steer scientist Pete Burnap.

URLs are constantly shortened on Twitter caused by character limitations inside posts, so it truly is incredibly difficult to understand which are legit, Burnap said.

New System Can Check For Malware In Twitter URLs

New System Can Check For Malware In Twitter URLs
New System Can Check For Malware In Twitter URLs

Once infected the malware are able to turn your computer in to a zombie computer and become part of a world network of machines utilized to hide information or maybe route further assaults.

Read More: Two-day Exhibition Of Samsung’s Latest Devices Starts Now

“In a 2013 document from Microsoft these types of ‘drive-by downloads’ were identified among the most active and commercial risks to be able to cyber-security, ” Burnap explained.

Check Also

2

Inbox By Gmail For Web Now Lets You Drop And Paste Images In Emails

Google has added a whole new feature to Mailbox by Gmail, providing it over by ...

2

Facebook Partners With UN To Bring Internet Access To Refugee Camps

Facebook is using the services of the United Nations make it possible for refugees from ...