How could hackers potentially take over your twitter account?

By Denise | January 12, 2015

Earlier today the US Central Command Twitter account was hacked. In this article I will give just a few examples of how this can happen to not only CENTCOM but to you as well.

For starters if you are logging in to Twitter on your mobile phone app, then the vulnerability could actually be through another phone app such as your flashlight. When you give access to apps even just the flashlight app to use your camera flash, you are giving this software access to your phone. Hackers can potentially enter your device through any installed software as a vulnerability. That is why it is important to keep an eye on what you give access to as well as keeping all software up to date at all times (this is true for mobile devices or traditional desktop/laptop computers), while this may not prevent all attacks, it will be safer.

Also while it is convenient to use a public wi-fi location it is certainly not safe. While you are connecting, you are transmitting information through radio waves this can be intercepted with the right tools by someone that is also connected to the same network. This person could be in the same internet café, the building next door, or in the parking lot, and they can be viewing everything that you are viewing including passwords and sensitive data. You can protect yourself by accessing your network through a VPN (Virtual Private Network), or by using encryption software, and many other solutions.

These are one of many examples of entry points for hackers. If you run a business and want to make sure your data is secure please feel free to contact us at 603-642-4010.

Details on the CENTCOM hack

http://www.wcvb.com/politics/centcom-twitter-account-hacked-suspended/30663034

 

Details on our IT Services

http://209.182.214.188/~rmon/it-services/managed-services/rmon-securenet/

Contact Us

Leave a Comment

Your email address will not be published. Required fields are marked *