Feeds

Twitter bans security maven for sharing naughty link

"We scan evrythng"

Secure remote control for conventional and virtual desktops

A well known security researcher was banished from Twitter for more than two days for including the address of a malicious website in a two-month-old dispatch.

On Tuesday, Mikko Hypponen, chief research officer for anti-virus provider F-Secure, found his Twitter account suspended with no explanation. Every one of his tweets had been erased, and those trying to visit his page found a message that said: "Sorry, the account you were headed to has been suspended due to strange activity. Mosey along now, nothing to see here."

Hypponen said his messages to Twitter officials went unanswered, as, indeed those from The Register did as well.

On Friday, his account was reinstated, and around the same time, he received an explanation of sorts. It read:

I've unsuspended your acct.
You were suspended for using the malware URL rnyspeceDOTcom in DMs.
Be careful!
We scan evrythng for malware.

This link shows Hypponen making a reference to a MySpace phishing site on August 3 that read: "I guess somebody will fall for it... a desperate Myspace phishing site at www. rnyspece. com. (don't go there)."

No, it wasn't a direct message, and no, there was no malware involved with the site. And yes, the URL contained spaces to prevent the security challenged from accidentally visiting the site. Ironically, Hypponen happened to be among the first to discover Twitter's malware filter.

The incident highlights the fine line Twitter has to walk in policing its site. As The Reg and plenty of others have pointed out, the site has become a hot bed for come ons that try to trick people into visiting sites that steal their personal information or install malware. Twitter, with its millions of dollars in financing, has an obligation to filter out at least some of the garbage.

But if it hopes to be taken seriously, it can't indiscriminately banish users who legitimately include a suspicious looking phrase or link in a message, especially one that's two months old. Just ask Hypponen, who writes on his newly reinstated account: "This sucks."

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.