Thursday, November 8, 2012

Twitter hacked? Prevent twitter, facebook, gmail accounts being hacked


The hacking of accounts, whether it be Paypal, Twitter, Gmail, Hotmail, Pinterest or practically any online application, is nothing new. Today it is thought that Twitter may have been hacked. Big names like TechCrunch and several other users who were possibly hacked would have received the following message from the company:
“Twitter believes that your account may have been compromised by a website or service not associated with Twitter. We’ve reset your password to prevent others from accessing your account,”

Why hackers consider Twitter worthy of their attention?

In the Obama campaign, Google plus has had less support than Romney in the election, now that is pretty low percentage wise! So Twitter is “the in thing” and has enjoyed tremendous publicity. People charge money, known as “pay per tweet” in order to send messages to followers – hence when hackers control popular accounts even for as little as 2 hours, they can profit by using it as a marketing tool, without the permission of it’s lawful owner.

How to avoid getting hacked on Twitter:

  1. Change of passwords: Consider changing your password after logging in from a public computer or any device that is not your own. People can run key loggers in the background, meaning that every character being typed, is effectively recorded and stored, without the user realising it, this is how passwords are captured.
  2. Hackers have other methods of accessing your computer via the internet and can also record keywords – hence it is a good idea in principle to change passwords frequently even if using the same device.
  3. Big companies like Twitter, Google, Microsoft for example may have excellent security measures in place, however they are not infallible: That is what hackers do – they find ways of breaching internet security and can target the best of the best.
  4. It is advisable to always make sure that the correct site is on display in the title bar when entering passwords. Hackers are smart, they may create domains which appear to be very similar to that of the target. If the target is “twitter.com” they would create a domain, for example, called “twiter.com” or “twitters1.com” or in the case of “gmail.com” they could use names such as “gma1l.com”. They would effectively create something rather similar to the target – and when user fatigue set’s in, amongst frequent users – they can collect the details of our passwords.
The same principles that are used to hack Twitter and others, can also be used to gather credit card details. The popularity of Twitter will be a great publicity stunt for governments who’d like to accelerate global governance and a new world order: They will not insist on it – it will be us, the people, who’d cry out for the protection of the governments and they will conveniently “save us” with an enhanced ID solution, watch this space!

No comments:

Post a Comment