News

Twitter.com was once again the brunt of a rapidly spreading worm after attackers exploited a vulnerability in "onMouseOver" JavaScript in order to bombard users with serial pop-ups and ...
The attack took advantage of the main Twitter’s web interface, which fails to disallow the ‘onMouseOver’ Javascript command.
Google is constantly combatting search engine spammers (I know some to do not like to be called this, so sorry). This past update, they began blocking an other type of spam named onmouseover ...
The massive Twitter "onMouseOver" attack on Tuesday may have been triggered by a Japanese hacker who claimed he wanted to expose a cross-site scripting flaw on the site.
Updates at bottom of post – Twitter’s official response There is apparently a security flaw in the Twitter code that is allowing users to have third-party websites open in your browser, and ...
Javascript command used to distribute malware. Australian teenager Pearce Delphin has been credited with discovering the onMouseOver scripting vulnerability that hit twitter.com last night.
Hopefully Twitter will shut down this loophole as soon as possible – disallowing users to post the onMouseOver JavaScript code, and protecting users whose browsing may be at risk. Some users are also ...
The attack took place after the main Twitter web interface failed, allowing the ‘onMouseOver’ JavaScript command to take place. This meant any user moving their mouse over the command would be ...