Twitter: conduit for nefarious purposes?

Twitter allows users to grant access to followers to read their postings. But some followers are sending inappropriate links.

Clicking on those links can take Twitter users to Web sites loaded with spyware that can hack into personal computers.

Hackers and porn spam is increasing with Twitter.

Recently, tech evangelist and business guru /*Guy Kawasaki*/'s Twitter account was used by criminals to install a nasty Trojan horse program on victim's computers to carry out online attacks.

Trojan horse programs, named for the Trojan Horse story in Greek mythology, appear to preform a desirable function, but facilitate unauthorized access to the user's computer system.

Report Typo |  Send Tip |  Get Alerts | Most Popular
Follow @abc7 on Twitter  |  Become a fan on Facebook

Copyright © 2024 KABC Television, LLC. All rights reserved.