Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, February 2, 2013

Twitter: Hacking attacks may have accessed data of 250K users

Posted on 2:39 AM by Unknown

Twitter said today that it recently detected a series of attempts to hack into user data, and that the attackers may have successfully absconded with some users' information.
In a blog post this afternoon, Twitter explained the situation, and the steps it has taken to fight off the hackers.

 This week, we detected unusual access patterns that led to us identifying unauthorized access attempts to Twitter user data. We discovered one live attack and were able to shut it down in process moments later. However, our investigation has thus far indicated that the attackers may have had access to limited user information -- usernames, email addresses, session tokens and encrypted/salted versions of passwords -- for approximately 250,000 users.
As a precautionary security measure, we have reset passwords and revoked session tokens for these accounts. If your account was one of them, you will have recently received (or will shortly) an email from us at the address associated with your Twitter account notifying you that you will need to create a new password. Your old password will not work when you try to log in to Twitter.
In an email affected users (including myself) received, Twitter wrote that it "believes that your account may have been compromised by a website or service not associated with Twitter. We've reset your password to prevent others from accessing your account."
Many people are speculating on Twitter that the affected accounts are all among the service's earliest -- in other words, that they were accounts created in 2006 or 2007, since only accounts that old seem to have received the notice from Twitter. It appears that the hackers behind the attacks had not targeted any specific group, like political dissidents or media organizations.
In its blog post, the company said that a very small number of users were affected by the hacking, but it encouraged everyone who uses the service to ensure that they are practicing "good password hygiene, on Twitter and elsewhere on the Internet." Among its suggestions: using unique passwords of at least ten characters, including a mix of upper and lower case letters, numbers, and symbols. Based on attacks on other high-profile tech and media companies, Twitter also said it is recommending the U.S. Department of Homeland Security's recent advisory on disabling Java, among other precautions.
The notice that CNET reporter Daniel Terdiman and up to 250,000 others got from Twitter today.
(Credit: Screen shot by CNET)
 This attack was not the work of amateurs, and we do not believe it was an isolated incident. The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked. For that reason we felt that it was important to publicize this attack while we still gather information, and we are helping government and federal law enforcement in their effort to find and prosecute these attackers to make the Internet safer for all users.
Source
Email ThisBlogThis!Share to XShare to Facebook
Posted in twitter | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to create a Windows 8 shutdown tile
    1. It starts, ironically, in Desktop mode, which you can reach by clicking/tapping the Desktop tile or pressing  Win-D  (that's the Wind...
  • Apple wins design patents for slide-to-unlock, original iPhone
    U.S. Patent and Trademark Office grants design patents for the contentious user interface asset. Apple was granted design patents today for ...
  • Windows Blue: How it could reinvent Windows (or sink Windows 8)
    With Windows 8's much ballyhooed launch barely a month behind us, alleged details of Microsofts  next  next-generation operating system ...
  • The "Other" Facebook inbox you didn't know you had
    I know loads of Facebook users who never bother to check their notifications. You know, that area in the top-left corner of the screen, the ...
  • Put your passwords in your pocket and take them everywhere you go
    My own personal favorite password manager,  Password Safe , isn't officially portable. But in practice, it sort of is. After you install...
  • Obama opposes Silicon Valley firms on immigration reform
    President Obama opposes an immigration reform bill backed by companies including Apple, Microsoft, and Adobe that would let U.S.-educated co...
  • Learn to build a PC in under two minutes
    Building a computer is a great way to get a custom configuration, save some money and have fun. In this how-to video, we'll show you how...
  • LinkedIn shuts down would-be hook-up service
    LinkedIn has shut off its API access to “Bang With Professionals,” a Web service that was intended to facilitate more, say, intimate connect...
  • How to recover corrupted PowerPoint file using TEMP folder?
    Today tip will help you to recover the unreadable and corrupted file of Microsoft PowerPoint. Normally PowerPoint open files can become ...
  • How to change ur static ip
    To start off, you need a direct connection to your modem and computer. If you have a router, disconnect it and directly hook up your modem t...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ▼  February (17)
      • PlayStation 4 vs. PC graphics: Can Sony even compete?
      • How to make Ubuntu Linux look like Windows 7
      • Power through Gmail with 21 time-saving tricks
      • How to banish Metro from your Windows 8 PC forever
      • Rumored Sony PS4 controller shows new thumbsticks
      • Pirate Bay to sue antipiracy site for pirating its...
      • Secure boot loader now available to allow Linux to...
      • LinkedIn shuts down would-be hook-up service
      • How to optimize Windows 8 on old hardware (2)
      • How to optimize Windows 8 on old hardware (1)
      • Facebook Connect issue wreaks havoc on the Web
      • Ubuntu OS smartphones to hit stores in October
      • Apple wins design patents for slide-to-unlock, ori...
      • Latest jailbreak for iOS arrives, works with iPhone 5
      • Samsung Galaxy S4 a no-show at Mobile World Congress
      • What it really takes to make a flexible phone (Sma...
      • Twitter: Hacking attacks may have accessed data of...
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile