Skip to Content

Tracking Social Spam

Hacked Facebook accounts produce most of the spam on the world’s largest social network.
December 21, 2010

Source: “Detecting and Characterizing Social Spam Campaigns”
Hongyu Gao et al.
ACM Internet Measurement Conference, November 1-3, 2010, Melbourne, Australia

Results: In the first large-scale study of spam activity on Facebook, researchers at Northwestern University and the University of California, Santa Barbara, showed that most of these messages originate from compromised accounts rather than from phony profiles. Spammers use those accounts to send messages to a victim’s friends. Typically, the messages contain links to pharmacy sites or pages that attempt to steal more account details.

Why it matters: With more than half a billion users, Facebook is a tempting target for spammers but one that is much more difficult to exploit than e-mail. Understanding how spammers are using Facebook is important to developing defenses against them as the network continues to grow and as attack strategies evolve. Academics say that publicly reporting spam also encourages Facebook to be more forthcoming about its efforts to protect users from this activity.

Methods: Facebook is built around the concept of letting you share information only with other users you have chosen to connect with. But until late 2009, most users were part of regional “networks” that allowed all the people in, say, a given city or university to access one another’s profiles. The researchers made use of that feature and joined several large regional networks. They then downloaded the profiles and public messages of roughly 3.5 million users. The public messages obtained were analyzed for traces of spam activity.

Next steps: The researchers plan to share their results with Facebook to help the company reduce spam and identify telltale patterns that could be used to spot accounts taken over by spammers. They will also continue to run similar analyses to track how spam activity and strategies change.

Fast Processing

A new algorithm could speed image processing, recommendation systems, and more

Source: “Approaching Optimality for Solving SDD Linear Systems”
Ioannis Koutis et al.
IEEE Symposium on Foundations of Computer Science, October 23-26, 2010, Las Vegas, Nevada

Results: A new algorithm offers a significantly faster way to solve certain systems of linear equations. The Carnegie Mellon researchers who created the algorithm say it could enable an ordinary desktop computer to solve billion-­variable systems in seconds.

Why it matters: The equations that this algorithm can solve have a wide variety of practical applications. For example, Netflix uses them to factor in myriad variables in making movie recommendations. In image processing, they are used to identify different parts of a picture and remove blurry spots. They are also used to optimize systems—calculating, for example, the maximum number of vehicles that can run through a network of highways.

Methods: To solve a complex set of equations, researchers typically start by producing a simplified version that is easily solved. This version can guide them in tuning the steps to solving the full system of equations. In the new study, the researchers used a combination of graph theory techniques to come up with a much better way to simplify the system.

Next steps: The algorithm can be used to create new “solvers”—series of algorithms that can solve for the variables in a given system of linear equations. The researchers are working to extend their methods to different types of linear-equation systems, which would allow them to solve more types of real-world problems more efficiently.

Keep Reading

Most Popular

DeepMind’s cofounder: Generative AI is just a phase. What’s next is interactive AI.

“This is a profound moment in the history of technology,” says Mustafa Suleyman.

What to know about this autumn’s covid vaccines

New variants will pose a challenge, but early signs suggest the shots will still boost antibody responses.

Human-plus-AI solutions mitigate security threats

With the right human oversight, emerging technologies like artificial intelligence can help keep business and customer data secure

Next slide, please: A brief history of the corporate presentation

From million-dollar slide shows to Steve Jobs’s introduction of the iPhone, a bit of show business never hurt plain old business.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.