NEVER GET BLOCKED AGAIN!
  • Fastest USA IPs in the industry
  • Unrivaled connection strength
  • All application compatible
  • Easy to use software
  • Anonymous browsing

New System Can Assess in Twitter URLs for Malware

Computer scientists from Cardiff University have created an intelligent system to recognize malicious links.

“We want to construct systems that may help law enforcement authorities make decisions in a changing cyber security landscape,” said principal investigator on the job, professor Omer Rana.

As individuals are using social networks like Twitter to discover info about events, the high volume of traffic around large scale events creates a perfect environment for cybercriminals to start assaults that are surreptitious.

The scientists gathered tracked interactions between a web site along with a user’s apparatus to recognise the characteristics of a malicious assault, and tweets including URLs during cricket world cup finals and the 2015 Superbowl.

URLs are constantly shortened because of character restrictions in posts on Twitter, so it’s not very easy to understand which are not unlawful, Burnap said.

Once your personal computer cans turn into a zombie computer and become part of an international network of machines used to conceal course or advice additional strikes.

“In an 2013 report from Microsoft these ‘driveby downloads’ were identified as truly one of the very active and commercial threats to cybersecurity,” Burnap said.

by admin on September 26th, 2015 in Technology

There are no comments.

Name: Website: E-Mail:

XHTML: You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>
Show Buttons
Hide Buttons