Twitter was cut down by 17-year-old hacker
In just two weekends, Twitter's 'microblogging' was knocked down twice by a young man living in Brooklyn. The boy said he did so to alert Twitter to patch the vulnerability
In just two weekends, Twitter's 'microblogging' was knocked down twice by a young man living in Brooklyn. The boy said he did so to warn Twitter to patch a security hole and also because he was depressed and wanted to be noticed.
Michael 'Mikeyy' Mooney attacks Twitter
The boy named Michael 'Mikeyy' Mooney said he was very disappointed about Twitter so that the vulnerability happened too long. Therefore, he wanted everyone to pay attention to it.
Just like the worm StalkDaily spread on Saturday (April 11), the worm 'Mikeyy' sent a series of warning messages on users' websites. 'Mikeyy' has begun to spread on this 'microblogging' since early morning on Sunday. This 17-year-old boy has no intention of harming Twitter, so he broadcast a message saying: ' Mikeyy is written by me and ask Twitter to patch this error, cherish Mikeyy '
Mooney has long dreamed of becoming a security expert. He said he started writing computer worms three years ago. He said he wrote these programs not to harm anyone. However, this time, Mooney is depressed and wants to be famous. Mooney believed that the website he created had been active for only a few weeks and that 950 members would "float up" after he spread the attack on Twitter.
On Saturday, Twitter patched the vulnerability that allowed worms to spread throughout the network. ' There are no passwords, phone numbers or personal information stolen, ' the Twitter representative said.
However, on Sunday, Mooney released another type of worm, continuing to take advantage of the vulnerability that Twitter announced patched.
You should read it
- Prevent Mikeyy from infecting his Twitter account
- 'Red alert' after the hack targeted Twitter, Facebook removed the feature matching contacts with phone numbers in Messenger
- Twitter appears 'error' that causes user information to be approached by third-party advertising providers
- The 17-year-old Hacker 'devastated' the Twitter network
- Detecting vulnerabilities in BitTorrent applications allows hackers to control user computers
- Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computer
- Good hackers find and patch the vulnerability for more than 100,000 other routers
- The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
- Many types of malicious code run Twitter social network
- Instructions for using Twitter for new users
- There is a new zero-day vulnerability in Windows
- The US shares the top 20 vulnerabilities most exploited by Chinese hackers since 2020 until now
Maybe you are interested
TunesKit AceMovi: Best Video Editing Software for Beginners and Professionals Find out why weapons Terracotta army of Qin Shi Huang still shiny and sharp after more than 2000 years How to create flip mirror effect in videos with Camtasia Top best video editing software on computer How to change video speed on Camtasia Studio How to edit videos with Photos Windows 10 Fall Creators application