Twitter Hacked: Quarter Million Accounts Compromised.


February 5, 2013

Corporate IT Security

Twitter makes the news once again. Another reminder about the vulnerabilities of cloud services and why it is so critically important that businesses maintain sound IT security practices.

Late in January, Twitter suffered down time causing users of the popular social media service to go through some pretty serious withdrawal.  However, this latest security breach caused alarm bells to go off throughout the business and casual Twitter universe.

Twitter claims they were the target of a sophisticated attack. The company wrote in their Twitter blog that they detected unusual patterns that led it to identify attempts to access user information.

Bob Lord, Twitter’s Director of Information Security wrote in the Twitter blog “We discovered one live attack and were able to shut it down in process moments later.” Further investigation identified that the attackers may have accessed some user information such as usernames, email addresses, session tokens and encrypted passwords of approximately a quarter million Twitter users.

This Twitter attack was the work of seasoned Internet hackers and it is believed that it is part of the same attack that hit other leading websites recently.

Twitter also advices their users to avoid the use of websites that promise to get you lots of followers. These sites are known sources of spam.

Anything online must be secured including your corporate Twitter account. Our team of IT security professionals takes your corporate IT security seriously and this Twitter attack is another reminder of needing corporate IT security policies in place and regular tests implemented to ensure all systems work.

Do you have questions about your corporate IT security?

Give our team of IT security professionals a call and book a no obligation discussion and understand the risks that may impact your business.

We're Integris. We're always working to empower people through technology.

Keep reading

How the Best IT Companies in Minnesota Support the Hybrid Workforce

How the Best IT Companies in Minnesota Support the Hybrid Workforce

After the initial shutdowns and stay-at-home orders lifted following COVID-19, workers throughout the United States and Minnesota decided that the work-from-home model was here to stay. It makes sense -- working from home offers a lot of convenience to your team – and...

Do I Need To Improve My Endpoint Protection?

Do I Need To Improve My Endpoint Protection?

A compromised endpoint gives hackers everything they need to get a foothold in your security network. Once there, they can steal data and potentially hold it for ransom. That’s why it’s so important for business owners to secure their critical endpoints (including...

Multi-Factor Authentication

Multi-Factor Authentication

Granting access to information is a necessity, as is security for both the user needing access and for the information for which access is being granted. The best way to handle this is by establishing user accounts for users. This does several things at once: Allows...