Adobe Flaw Leaves Millions of Twitter Users at Risk
Security researchers are warning the Twittering world that their credentials may be vulnerable to hackers. The most disturbing news, however, is that the problem, which exploits Adobe System's Flash programming language, was first discovered almost four years ago.
Mike Bailey, a senior security analyst with Foreground Security in Orlando, Florida has informed Twitter of the flaw. However, all warnings seem to have fallen on deaf ears. Most website operators have downplayed the severity of the situation, even though it could compromise many users.
No Restorative Actions to Date
Frustrating still, Bailey believes that it would take as little as a few hours to correct the error by changing the way the site is programmed. On top of that, Adobe has even laid out ways to address the vulnerability for programmers. Still, no restorative action has taken place.
As popular as the microblogging site has become, hackers were bound to follow the next social networking trend. Twitter especially has become a prime target for hackers, because they are able to spread their malicious software to millions of users around the world quickly and easily.
Twitter Becoming Frequent Target
This would not be the first time that Twitter has been the target for hackers with cruel intentions on their minds. Last month, a hacker successfully hijacked the social network site and redirected it to one that claimed to represent a group calling itself the Iranian Cyber Army. (Source: itpro.co.uk)
The attack made international news and was done by an individual who had stolen the account credentials that Twitter used to route its traffic. However, unlike in the case of the Adobe flaw, the previous hijacking did not compromise the credentials of Twitter users.
Users Vulnerable for Over a Year
Bailey believes that Twitter users may have been vulnerable to attack for over a year now. However, it is impossible to know for sure whether hackers had actually exploited the Adobe flaw during that time. (Source: financialpost.com)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.