Researchers at Web of Trust found that 5% to 10% of shortened URLs point users to malicious sites. Should enterprises...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
educate users to not click on shortened URLs? Do any antimalware products scan shortened URLs for malicious intent?
Ask the Expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Web of Trust (WOT) researchers published a detailed analysis of shortened URLs pointing to malicious URLs. They found that anywhere from 5% to 91% of shortened URLs, depending on the service and country, point to unsafe websites. The more common URL shorteners appear to have the lowest percentage of malicious short URLs, whereas 91% of the websites linked to by shortened URLs from .ac (Ascension Island) domains were rated poorly.
Enterprises can educate users to critically evaluate shortened URLs, websites, emails and other messages, but this may not be an effective way to prevent users from clicking on a malicious short URL. Some of the same issues are found in malicious QR codes, where a user can't distinguish the destination URL from the short URL. WOT offers a free browser add-on that can help protect against unsafe websites. There are some other technologies beyond the WOT browser add-on, including browser add-ons that display the full URL for a shortened URL, that can check the reputation of the destination website. Some antimalware products do scan URLs, including shortened URLs, for malicious intent. All of these technologies can provide additional protection in case a user clicks on a malicious URL.
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Bitdefender discovered that the NotPetya malware changes its behavior when Kaspersky security products are detected. Nick Lewis explains how the ...continue reading
The Katyusha Scanner is based on the open source penetration test scanner Arachni. However, it has been modified to work through Telegram accounts. ...continue reading
A Libgcrypt vulnerability could allow attackers to recover private RSA-1024 keys, as it allows a left-to-right sliding window that shows how specific...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.