Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, February 2, 2013

Twitter: Hacking attacks may have accessed data of 250K users

Posted on 2:39 AM by Unknown

Twitter said today that it recently detected a series of attempts to hack into user data, and that the attackers may have successfully absconded with some users' information.
In a blog post this afternoon, Twitter explained the situation, and the steps it has taken to fight off the hackers.

 This week, we detected unusual access patterns that led to us identifying unauthorized access attempts to Twitter user data. We discovered one live attack and were able to shut it down in process moments later. However, our investigation has thus far indicated that the attackers may have had access to limited user information -- usernames, email addresses, session tokens and encrypted/salted versions of passwords -- for approximately 250,000 users.
As a precautionary security measure, we have reset passwords and revoked session tokens for these accounts. If your account was one of them, you will have recently received (or will shortly) an email from us at the address associated with your Twitter account notifying you that you will need to create a new password. Your old password will not work when you try to log in to Twitter.
In an email affected users (including myself) received, Twitter wrote that it "believes that your account may have been compromised by a website or service not associated with Twitter. We've reset your password to prevent others from accessing your account."
Many people are speculating on Twitter that the affected accounts are all among the service's earliest -- in other words, that they were accounts created in 2006 or 2007, since only accounts that old seem to have received the notice from Twitter. It appears that the hackers behind the attacks had not targeted any specific group, like political dissidents or media organizations.
In its blog post, the company said that a very small number of users were affected by the hacking, but it encouraged everyone who uses the service to ensure that they are practicing "good password hygiene, on Twitter and elsewhere on the Internet." Among its suggestions: using unique passwords of at least ten characters, including a mix of upper and lower case letters, numbers, and symbols. Based on attacks on other high-profile tech and media companies, Twitter also said it is recommending the U.S. Department of Homeland Security's recent advisory on disabling Java, among other precautions.
The notice that CNET reporter Daniel Terdiman and up to 250,000 others got from Twitter today.
(Credit: Screen shot by CNET)
 This attack was not the work of amateurs, and we do not believe it was an isolated incident. The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked. For that reason we felt that it was important to publicize this attack while we still gather information, and we are helping government and federal law enforcement in their effort to find and prosecute these attackers to make the Internet safer for all users.
Source
Email ThisBlogThis!Share to XShare to Facebook
Posted in twitter | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Will New Internet Domain Names Change the Web?
    Finally, the World Wide Web will live up to its name. The decision by the Internet Corporation for Assigned Names and Numbers (ICANN) that W...
  • How to sync files and folders across two PCs
    Here are four ways to do this, although--technically speaking--only two of them actually keep the files on both PCs. The others merely make ...
  • Rugged laptop guide
    Our rugged laptop guide will give you more information on rugged laptops and rugged notebooks than, let’s say, 95% of regular rugged laptop ...
  • LinkedIn shuts down would-be hook-up service
    LinkedIn has shut off its API access to “Bang With Professionals,” a Web service that was intended to facilitate more, say, intimate connect...
  • Yahoo Reject Microsoft ! Glance At New Corp.
    As we know, Microsoft is aggressively try to overtaking Yahoo. They launch 44,6 billion dollar AS bid ! This is the biggest offer that ever ...
  • Rumored Sony PS4 controller shows new thumbsticks
    As the speculation on Sony's next game console is ramps up ahead of  next week's press event , a pair of images have surfaced, purpo...
  • Twitter: Hacking attacks may have accessed data of 250K users
    Twitter said today that it recently detected a series of attempts to hack into user data, and that the attackers may have successfully absco...
  • Why Microsoft redesigned Windows
    Windows 8 has its fans and foes, but Microsoft felt the time was ripe for a new look and feel for a product used by more than 1.2 billion pe...
  • How Access Registry Using Command Prompt
    Firstly, you need to know that regedit.exe is a tool that created to access registry based on windows. And reg.exe is a tool that created ...
  • Pirate Bay to sue antipiracy site for pirating its design
    An antipiracy group may find itself in legal trouble after borrowing the look of the Pirate Bay Web site for a new campaign. The Pirate Bay...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ▼  February (17)
      • PlayStation 4 vs. PC graphics: Can Sony even compete?
      • How to make Ubuntu Linux look like Windows 7
      • Power through Gmail with 21 time-saving tricks
      • How to banish Metro from your Windows 8 PC forever
      • Rumored Sony PS4 controller shows new thumbsticks
      • Pirate Bay to sue antipiracy site for pirating its...
      • Secure boot loader now available to allow Linux to...
      • LinkedIn shuts down would-be hook-up service
      • How to optimize Windows 8 on old hardware (2)
      • How to optimize Windows 8 on old hardware (1)
      • Facebook Connect issue wreaks havoc on the Web
      • Ubuntu OS smartphones to hit stores in October
      • Apple wins design patents for slide-to-unlock, ori...
      • Latest jailbreak for iOS arrives, works with iPhone 5
      • Samsung Galaxy S4 a no-show at Mobile World Congress
      • What it really takes to make a flexible phone (Sma...
      • Twitter: Hacking attacks may have accessed data of...
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile