Feeds

Extra spam and malware security for bit.ly

Sophos, VeriSign and Websense to provide belt and braces

The Power of One eBook: Top reasons to choose HP BladeSystem

Bit.ly has partnered with security firms to bolt improved anti-spam and malware protection onto the URL shortening service.

VeriSign’s iDefense IP reputation service will be used to screen against links that point to blacklisted sites hosting exploits, malicious code, botnet command and control servers or other nefarious activity.

Websense Threatseeker cloud service will be used to peer behind the web content behind bit.ly links in real time, using behaviour-based tools and reputation data to detect URLs linked to spamvertised sites or phishing attacks.

Sophos is also chipping in by playing sweeper with behavioral-analysis technology designed to proactively detect spam and malware.

In addition to partnering with three well established security firms, bit.ly is also offering users a chance to download a preview plug-in, and is publicising its abuse reporting service (abuse@bit.ly) as explained in a blog posting here.

URL shortening services like bit.ly allow users to convert a lengthy Web address into a much shortened link. The popularity of these services have soared with the growing use of Twitter and other social media websites. More than two billion shortened URLs were created in October alone, according to Websense.

These shortened URLs may be convenient but pose a risk by camouflaging the destination website, a factor hackers and virus writers have already exploited to a limited extent. By partnering with the three security firms, bit.ly hopes to nip this nascent problem in the bud before it gets out of hand.

Twitter began using Google's Safe Browsing API to provide warning to users following links to blocklisted sites back in August. Bit.ly's partnership with securiy firms is aimed at much the same problem but arguably provides a deeper level of protection. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.