Twitter was cut down by 17-year-old hacker
In just two weekends, Twitter's 'microblogging' was knocked down twice by a young man living in Brooklyn. The boy said he did so to warn Twitter to patch a security hole and also because he was depressed and wanted to be noticed.
Michael 'Mikeyy' Mooney attacks Twitter
The boy named Michael 'Mikeyy' Mooney said he was very disappointed about Twitter so that the vulnerability happened too long. Therefore, he wanted everyone to pay attention to it.
Just like the worm StalkDaily spread on Saturday (April 11), the worm 'Mikeyy' sent a series of warning messages on users' websites. 'Mikeyy' has begun to spread on this 'microblogging' since early morning on Sunday. This 17-year-old boy has no intention of harming Twitter, so he broadcast a message saying: ' Mikeyy is written by me and ask Twitter to patch this error, cherish Mikeyy '
Mooney has long dreamed of becoming a security expert. He said he started writing computer worms three years ago. He said he wrote these programs not to harm anyone. However, this time, Mooney is depressed and wants to be famous. Mooney believed that the website he created had been active for only a few weeks and that 950 members would "float up" after he spread the attack on Twitter.
On Saturday, Twitter patched the vulnerability that allowed worms to spread throughout the network. ' There are no passwords, phone numbers or personal information stolen, ' the Twitter representative said.
However, on Sunday, Mooney released another type of worm, continuing to take advantage of the vulnerability that Twitter announced patched.
You should read it
- Twitter appears 'error' that causes user information to be approached by third-party advertising providers
- The 17-year-old Hacker 'devastated' the Twitter network
- Detecting vulnerabilities in BitTorrent applications allows hackers to control user computers
- Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computer
- Good hackers find and patch the vulnerability for more than 100,000 other routers
- The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
- Many types of malicious code run Twitter social network
- Instructions for using Twitter for new users
May be interested
- Hackers: Crime and punishmentgather 10 cases of hackers around the world to see how severe the penalties are compared to the crimes committed by them
- Russian Hacker performs a new attack tacticrussian hacker has stolen personal information in the us, combined with commercial software and social networks to organize destructive attacks on the internet.
- Explore System Configuration Utilityamong the many wizards and utilities built into microsoft windows xp, system configuration utility or msconfig is a pretty useful utility introduced in the windows 9.x operating system line.
- Super hackers steal tens of millions of credit card datain the biggest bank card theft in the united states, 28-year-old hackers were fined $ 2.7 million and have the ability to 'peel off the calendar' for decades in prison.
- The DDoS attack culprit website Vietco shows up!subjects conducting attacks to deny distributed services (ddos) on the e-commerce website vietco recently were investigated by the investigating agency on april 28, 2006. the audience has initially embraced ddos behaviors
- 10 most famous hacks of all time6 lines of code are enough to blow away $ 10 million of a business. the other 99 lines of code set up the first internet virus (worm). the telephone network of the whole city is controlled only because a hacker wants a fashionable car ... the systems that are considered to be the best security have been penetrated.