Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 2 - Social Networking Security
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Social Networking Security
By: Bruce Coker
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 4 stars4 stars4 stars4 stars4 stars / 5

    Table of Contents:
  • Social Networking Security
  • Twitterank Issues
  • Password Sharing Hazards
  • Other Social Network Security Hazards

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Social Networking Security - Twitterank Issues

    (Page 2 of 4 )


    The Twitterank fiasco was especially revealing. It demonstrated unequivocally that thousands of microbloggers were prepared to hand over their passwords in exchange for what amounted to little more than a random number.

    In a sense we should perhaps be grateful to the experiment's originator Ryo Chijiiwa for exposing a danger that has been growing for months in parallel with Twitter's ever-increasing popularity. On little more than a whim, Chijiiwa spent a hotel-bound evening hacking together an application to generate a Twitter popularity "ranking" based on the volume of inbound tweets to any named account.

    In order to accomplish this he was forced to tackle the same problem as that faced by hundreds of other developers of third-party Twitter add-ons: the only way to make a web service request to Twitter is by supplying an account name and password.

    In an obvious and unacceptable security hazard, the account information of anyone who uses such an add-on is passed to Twitter via the unregulated third-party site set up by the developer. And however tempting and appropriate it is to criticize users for supplying their account details to persons unknown, the fact is that the problem is largely of Twitter's own making.

    By failing to implement technology such as OAuth to provide secure third-party access to its services, the company has opened the way to a whole variety of phishing expeditions. The fact that Chijiiwa's experiment turned out not to be one should not provide anyone with the even slightest shred of reassurance.

    More Web Hosting Articles Articles
    More By Bruce Coker


    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap