News

HOME news security 227500393 Twitter.com Shuts Down 'onMouseOver' Attack Security Twitter.com Shuts Down 'onMouseOver' Attack By Stefanie Hoffman September 21, 2010, 08:58 PM EDT ...
Google is constantly combatting search engine spammers (I know some to do not like to be called this, so sorry). This past update, they began blocking an other type of spam named onmouseover ...
The massive Twitter "onMouseOver" attack on Tuesday may have been triggered by a Japanese hacker who claimed he wanted to expose a cross-site scripting flaw on the site.
Turn off JavaScript for Twitter! Update 2 (14:13 CEST): It is possible to load secondary JavaScript from an external URL with no user interaction, which makes this definitely wormable and dangerous.
The attack took advantage of the main Twitter’s web interface, which fails to disallow the ‘onMouseOver’ Javascript command.
Hopefully Twitter will shut down this loophole as soon as possible – disallowing users to post the onMouseOver JavaScript code, and protecting users whose browsing may be at risk. Some users are also ...
The attack took place after the main Twitter web interface failed, allowing the ‘onMouseOver’ JavaScript command to take place. This meant any user moving their mouse over the command would be ...
Nyheder, analyser, viden, blogs og debat om it. Computerworld er dit medie om det digitale Danmark. Computerworld skriver om nye teknologier, hardware, software ...
Javascript command used to distribute malware. Australian teenager Pearce Delphin has been credited with discovering the onMouseOver scripting vulnerability that hit twitter.com last night.
The flaw is activated by inserting a line of JavaScript into the tweet, containing the command “onmouseover.” It seems that most people are using this exploit for playful trickery, generating ...