(Page 2 of 2)
From Apple to Twitter
In other security news this week, Symantec is exposing abusive tweets. Symantec reports that scammers are taking advantage of tweets in a way that is similar to how they rely on Internet search engines -- they create tweets that include keywords in them.
This is somewhat similar to how they design Web sites in order to gain visibility for their sites. In order for these sites to appear in search results, scammers need to make the effort to boost visibility, which is known as search engine optimization," Joji Hamada of Symantec wrote in the company blog.
"But tweets may require less effort by the scammers to get users to come across them: new tweets should appear at the top in the search results list for the most recent tweets. However, accounts engaging in automation , spam, and other violations of the Twitter Rules may be investigated for abuse."
Posted: 2012-04-05 @ 11:55pm PT
While Java has done pretty well in its niche “device” market, it hasn’t really fared as well on desktop platforms… and for good reason. Anyone (other than a Java programmer) that has been in the IT field for a while will tell you that the JRE is bloatware and should only be installed if your lifestyle/work depends on it. Otherwise it's just another security vulnerability waiting to happen.