The main problem I and many others have with these services is that they add another attack vector, a potentially unreliable redirect service involving additional DNS lookups and server hits sitting between the link and its destination. No one knows how secure or reliable these service providers are; they certainly offer no service-level agreement. Reliability and availability are key issues. Even with 99% uptime, that's still 3.5 days per year when these links won't work. It would also create additional points of failure for the Internet if everyone were to use shorteners. And don't forget that these providers are dot-com enterprises that could go bust and disappear overnight.
Another concern is that although many plain links aren't necessarily comprehensible. they are transparent; you can at least see the domain they will be taking you to. Shortened links offer no clue as to where they lead. In an attempt to monetize the service, you can easily imagine a provider starting to send pop-up ads along with the redirect, and we all know how annoying and potentially dangerous those are. If the shortener gets hacked or their domain is hijacked, it would be easy to set up a man-in-the-middle attack between the link and its destination, with every shortened link a potential malicious redirect. Given that recipients of these links would be getting them from trusted friends and relatives, the attack would be very effective.
Thankfully some sites, such as USA Today, that use long URLs are providing their own URL-shortening services, which keep the links within the control of the site itself. One improvement would be that shorteners only shorten URLs that exceed the 140 character limit. This or other safeguards are unlikely to come about unless there is pressure from users, and that probably isn't going to happen until there have been a few high-profile attacks exploiting link shorteners.
Dig Deeper on Web application and API security best practices
Related Q&A from Michael Cobb
By performing ongoing risk assessments, organizations can keep their SSH vulnerabilities at a minimum and ensure their remote access foundation is ... Continue Reading
Sending sensitive information in attachments is inherently unsafe, and the main way to secure them -- encryption -- can be implemented inconsistently... Continue Reading
Spyware can steal mundane information, track a user's every move and everything in between. Read up on the types of spyware and how to best fix ... Continue Reading