{"id":2002,"date":"2013-06-04T11:43:10","date_gmt":"2013-06-04T15:43:10","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=2002"},"modified":"2020-02-26T18:57:17","modified_gmt":"2020-02-26T14:57:17","slug":"avoiding-scams-and-trolls-on-twitter","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/avoiding-scams-and-trolls-on-twitter\/2002\/","title":{"rendered":"Avoiding Scams and Trolls on Twitter"},"content":{"rendered":"<p>Not long ago, Twitter was a novelty social media site that average users thought was silly. Now the microblogging tool is a vital news source and publishing platform, letting anyone share information and opinions from almost anywhere. Almost everyone is on it now, from your favorite celebrity to your parents.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/06\/05113456\/twitter_title1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2005\" alt=\"twitter_title\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/06\/05113456\/twitter_title1.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>But as is the case with every emergent trend on the Internet, Twitter is also populated by scammers and so-called \u2018<a href=\"http:\/\/www.pcmag.com\/encyclopedia\/term\/53181\/trolling\" target=\"_blank\" rel=\"noopener nofollow\">trolls<\/a>,\u2019 people who harass and provoke others with posts that range from the annoying to the profane. And what\u2019s more, that security risk is essentially built into Twitter \u2014 its public-facing nature allows anyone to follow or mention anyone else, meaning users have little control over who can read their tweets, or tweets about them. Specifically blocking individual users is the only ingrained privacy protection. Avoiding the pitfalls of Twitter is critical to critical to keeping your devices and your identity safe and secure.<\/p>\n<div class=\"pullquote\">The security risk is essentially built into Twitter \u2014 its public-facing nature allows anyone to follow or mention anyone else, meaning users have little control over who can read their tweets, or tweets about them.<\/div>\n<ol>\n<li><b><\/b><b>Know how and when to \u2018block.\u2019 <\/b>Whether they are bullies or spammers, sooner or later you\u2019re going to end up with unwanted and potentially malicious followers. Periodically scroll through your list of followers and \u2014 on Twitter\u2019s native platform \u2014 use the dropdown box next to the \u2018follow\/following\u2019 icon, you can select block to prevent them from seeing your updates. If these users are clearly creating malicious or otherwise suspicious content, you can use the same drop down box to report them for spam. The sooner you block spammers, the better, to prevent them from sending spam to others.<b><\/b><\/li>\n<li><b><\/b><b>Twitter Client Tips<\/b>. If you\u2019re a regular Twitter user, chances are you use one of the numerous Twitter clients that optimize its native platform with multiple streams and additional built-in tools, particularly on mobile devices. Tweetcaster and Plume are the two most popular for Android; tweeTRO, Rowi and FlipToast are <a href=\"http:\/\/geniusgeeks.com\/best-twitter-clients-for-windows-8\/\" target=\"_blank\" rel=\"noopener nofollow\">popular for Windows 8<\/a>. Tweetdeck was among the most popular clients particularly for iOS, but the mobile app has been <a href=\"http:\/\/mashable.com\/2013\/03\/04\/twitter-killing-tweetdeck\/\" target=\"_blank\" rel=\"noopener nofollow\">discontinued<\/a> (including for Android). In its stead, Tweetbot, Janetter Pro and Osfoora are the most popular Twitter clients in iOS app store. Depending on which client you use, blocking\/reporting spam for users will be different; some will be readily apparent, some will allow you to block and report in a single click, while others you have to hunt a little bit to find these features.<b><\/b><\/li>\n<li><b>Don\u2019t get hacked<\/b>. Trolls and attackers love to hack Twitter accounts (just ask any of the numerous high-profile users whose handles have been compromised), so it\u2019s critical to keep your account safe. Using <a href=\"https:\/\/threatpost.com\/password-security-dos-and-donts-050411\/\" target=\"_blank\" rel=\"noopener nofollow\">strong passwords<\/a> is essential: They should be long, should not be names or words found in the dictionary, and should include non-alphanumeric symbols. Twitter recently introduced <a href=\"https:\/\/me-en.kaspersky.com\/blog\/twitter-improves-hack-protection\/\" target=\"_blank\" rel=\"noopener\">two-factor authentication<\/a>, a significant boost to security for any online account, and while this can make signing in a longer process, that\u2019s a small price to pay for keeping your account safe.<\/li>\n<li><b>Beware trending topics<\/b>. Twitter created the concept of \u2018trending\u2019 topics, and hashtags are the Twitter medium for labeling content to increase its popularity. But beware, because whether it\u2019s the latest celebrity buzz or a major tragedy in the news, the line between trolling and scamming can blur when these <a href=\"http:\/\/www.zdnet.com\/blog\/security\/scareware-scammers-hijack-twitter-trending-topics\/4389\" target=\"_blank\" rel=\"noopener nofollow\">trending topics are hijacked<\/a> by Twitter users who tease to content that masquerades as relevant to the trending topic, but instead includes a link that leads to offensive or harmful web pages. Trolls are particularly effective at doing this because their posts during sensitive times inflame readers \u2014<a href=\"http:\/\/www.nbcnews.com\/technology\/cops-trolls-sharing-misinformation-about-school-shooting-crime-1C7648194\" target=\"_blank\" rel=\"noopener nofollow\">tweets mocking victims<\/a> of school shootings, for instance \u2014 and by outraging people can entice them to click through to bad content.<\/li>\n<li><b>Don\u2019t trust URL shorteners<\/b>. Related to the trending topic warning, trolls and scammers use URL shorteners like bit.ly because they disguise the ultimate endpoint of the shortened link. If a tweet has a shortened URL and isn\u2019t coming from a reputable source, don\u2019t click through \u2014 if it\u2019s legitimate content, you\u2019ll see it elsewhere on Twitter and be able to read it there.<\/li>\n<li><b>Don\u2019t share personal information<\/b>. This really shouldn\u2019t need to be said \u2014\u00a0and yet it does. People have shot themselves in their own feet on Twitter by posting personal information like their addresses and phone numbers, and there is even a handle devoted to people who have <a href=\"https:\/\/me-en.kaspersky.com\/blog\/the-next-time-you-feel-like-posting-a-picture-of-your-debit-or-credit-card-dont\/\" target=\"_blank\" rel=\"noopener\">shared pictures of their debit and credit cards<\/a> on Twitter. Because it apparently needs to be said, let\u2019s say it here: Sharing personal information with millions of strangers risks your personal safety and makes you a target for <a href=\"https:\/\/me-en.kaspersky.com\/blog\/prevent-identity-theft\/\" target=\"_blank\" rel=\"noopener\">identity theft<\/a>, so never, ever tweet personal information.<\/li>\n<li><b><\/b><b>Don\u2019t use public Wi-Fi<\/b>. Don\u2019t use other people\u2019s computers, or public computers, to access personal accounts including Twitter. And don\u2019t trust public Wi-Fi networks to access your accounts either; because public networks are rarely encrypted, attackers prey on their users to steal passwords and other personal data.<\/li>\n<\/ol>\n<p>Following these seven tips is critical to keeping your personal data safe and secure, but its important to always have a backup for your system and device security. Security suites like <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/pure?domain=kaspersky.com\" target=\"_blank\" rel=\"noopener\">Kaspersky PURE 3.0<\/a> defend against the latest malware and Internet threats and include password managers that help you handle your long, hard-to-hack passwords.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Not long ago, Twitter was a novelty social media site that average users thought was silly. Now the microblogging tool is a vital news source and publishing platform, letting anyone<\/p>\n","protected":false},"author":41,"featured_media":2004,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[344,211,83],"class_list":{"0":"post-2002","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-online-protection","9":"tag-social-media","10":"tag-twitter"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/avoiding-scams-and-trolls-on-twitter\/2002\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/avoiding-scams-and-trolls-on-twitter\/2002\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/avoiding-scams-and-trolls-on-twitter\/2002\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/avoiding-scams-and-trolls-on-twitter\/2002\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/avoiding-scams-and-trolls-on-twitter\/2002\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/avoiding-scams-and-trolls-on-twitter\/897\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/avoiding-scams-and-trolls-on-twitter\/2002\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/avoiding-scams-and-trolls-on-twitter\/2002\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/online-protection\/","name":"online protection"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2002"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2002\/revisions"}],"predecessor-version":[{"id":15558,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2002\/revisions\/15558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2004"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}