Wednesday, August 16, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Apple is Getting Serious in TV Shows and Film Prospect
Acer's New 4K Projectors Bring the Benefits of Cinema Home
Fiat Chrysler Joins BMW, Intel, Mobileye in Autonomous Driving Team
Kingston Adds Lower 4GB and 8GB Capacities to DataTraveler 2000 Encrypted USB
Intel Ice Lake Architecture Will Find its Way to 10nm+ Chips
CyberLink Launches U Web Communication App for Online Meetings
Samsung Introduces New Portable T5 SSD
Qualcomm Announces Depth-Sensing Camera Technology Designed for Android Devices
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Twitter...
Last 7 Days News : SU MO TU WE TH FR SA All News

Wednesday, September 22, 2010
Twitter Resolves "onMouseOver" Flaw


Twitter on Tuesday was notified of a security exploit which was immediately fixed. However, some time later a related issue came up tied to hovercards, which was also fixed.

The security exploit that caused problems was caused by cross-site scripting (XSS). Cross-site scripting is the practice of placing code from an untrusted website into another one. In this case, users submitted javascript code as plain text into a Tweet that could be executed in the browser of another user.

Twitter discovered and patched this issue last month. However, a recent site update (unrelated to new Twitter) unknowingly resurfaced it.

Early on Tuesday, a Twitter user noticed the security hole and took advantage of it on Twitter.com. First, someone created an account that exploited the issue by turning tweets different colors and causing a pop-up box with text to appear when someone hovered over the link in the Tweet. This is why folks are referring to this an "onMouseOver" flaw -- the exploit occurred when someone moused over a link.

Other users took this one step further and added code that caused people to retweet the original Tweet without their knowledge.

This exploit affected Twitter.com and did not impact the company's mobile web site or mobile applications. The vast majority of exploits related to this incident fell under the prank or promotional categories, Twitter said. Although users may still see strange retweets in their timelines caused by the exploit, the company is not aware of any issues related to it that would cause harm to computers or their accounts. Twitter says that there is no need to change passwords because user account information was not compromised through this exploit.

"We?re not only focused on quickly resolving exploits when they surface but also on identifying possible vulnerabilities beforehand. This issue is now resolved. We apologize to those who may have encountered it," Twitter added.


Previous
Next
BlackBerry Tablet Device May Launch Next Week        All News        Sony's Slim External BDX-S500U Blu-ray Burner Released in the United States
Netflix Launches Canadian Service for Streaming Movies and TV Episodes Over the Internet     General Computing News      Zune to Expand Services Into International Markets

Get RSS feed Easy Print E-Mail this Message

Related News
Twitter Struggles to Attract New Users
Twitter Lets you Mute Notifications From Unknown Accounts
Facebook, Microsoft, Twitter and YouTube Team Up To Counter Terrorism
Twitter Makes Changes to its Website, Mobile Apps
Twitter's Privacy Update Means You Are Officially Tracked
Twitter's Revenue Drops Despite User Growth
U.S. Government Withdraws Demand to Unmask Anti-Trump Account on Twitter
Twitter Releases 'Lite' Version For Emerging Markets
The European Commission Ask Social Media Companies To Comply With EU Consumer Rules
Twitter To Use Algorithms to Tackle Abusive Content
Twitter Pace of Growth Slows
Twitter To Filter Abusive Tweets

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .