Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

C2 provides technology services and consultation to businesses and individuals.

T (818) 584 6021
Email: [email protected]

C2 Technology Partners, Inc.
26500 Agoura Rd, Ste 102-576, Calabasas, CA 91302

Open in Google Maps
QUESTIONS? CALL: 818-584-6021
  • HOME
  • BLOG
  • SERVICES
    • Encryption
    • Backups
  • ABOUT
    • SMS Opt-In Form
    • Terms and Conditions
    • Privacy Policy
FREECONSULT
Wednesday, 21 August 2013 / Published in Woo on Tech

Twitter Hacked Again

Twitter Logo

An Islamist hacktivist going by the moniker “Mauritania Attacker” claims to have hacked and accessed the entire database of Twitter accounts. As proof of this exploit, he has published details on 15,000 accounts that included access tokens users have generated for other applications that use Twitter either as an authentication source, or as a means to publish data from or to the microblogging service. According to representatives from Twitter, no accounts have been compromised, and the account details released by the hacker did not contain passwords (hashed, encrypted or otherwise). Security analysts suspect that it may be possible to use the exposed security tokens to gain limited access to publish through the associated Twitter account via third party app (which is what the tokens are for in the first place) if a hacker could ascertain for which app a specific token was created.

What this means for you:

If you use Twitter, you should do two things:

  1. Enable login verification by going to your Twitter settings -> Account -> Login Verification. This basically sends out a confirmation to your mobile device that must be entered in order to log into your Twitter account.
  2. Revoke permissions to Twitter-enabled apps. You can do this by going to your Twitter settings -> Apps and clicking “Revoke Access” next to every app on the list, even the ones you might use frequently. Then, you can go back to your favorite apps and reauthenticate. This way, you can recreate the access tokens, and not have to worry about the possibility that your access tokens were among the ones shared by the Mauritania Attacker.
  • Tweet
Tagged under: authentication, breach, hacktivism, security, settings, token, Twitter

What you can read next

Update your tech vocabulary for 2023
godaddy-logo.jpg.png
GoDaddy Hacked – Thousands of Sites Offline
Microsoft's Surface Tablet
Surface Tablets: the honeymoon is over

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Closeup on phone with YouTube playing

    What We Can Learn About Business Continuity From the YouTube Outage

    YouTube being down is a minor inconvenience for...
  • Insurance Policy on table with technology around to depict cyber insurance

    Cyber Insurance Requirements for 2026: What Professional Services Firms Must Know

    In January 2026, a mid-sized accounting firm in...
  • Multi-Factor Authentication: The Security Measure Your Team Will Hate (But Needs)

    Look, I get it. Multi-factor authentication is ...
  • Business owner pressing an IT button with southern california in the background

    The Real Cost of Managed IT Services in Southern California (2026 Pricing Guide)

    Honest managed IT services in Southern Californ...
  • Person opening their email on a tablet

    Why Your Team Clicked That Phishing Email (And What It Really Means)

    I need to tell you something that might make yo...

Archives

  • GET SOCIAL
Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

© 2016 All rights reserved.

TOP