You need to be logged in to your Sky Poker account above to post discussions and comments.

You might need to refresh your page afterwards.

The great Twitter hack

2

Comments

  • kapowblamzkapowblamz Member Posts: 1,587
    VespaPX said:

    Will the hackers have access to any private messages?
    Could be interesting.

    They will of had full access. They changed the emails and that's how they changed the passwords so they had access to everything.

    Whether they use that info as a vehicle who knows.
  • chillingchilling Member Posts: 3,774
    Feb 2020.







  • madprofmadprof Member Posts: 3,461
    waller02 said:

    I reckon it was @mumsie

    Or Nozzer...playing the old double bluff...an it wizard but only for poker...?
  • madprofmadprof Member Posts: 3,461
    Cammykaze said:

    Tikay10 said:


    President Trump has a verified account.

    It's terrifying to think hackers could gain control of it. We could be in a war within days.

    Why bother?
    He's managing that all by himself.
    Partly.

    He communicates through Twitter so his words are not mismanaged by media outlets and the verified accounts being hacked is a concern.
    Seriously though guys...if the Donald sent out a twatter saying double your money...FFS who would believe that see u next tuesday!
  • cenachavcenachav Member Posts: 2,682
    I saw one of them pop up on my timeline. I think it was a retweet from @NChanning
  • VespaPXVespaPX Member Posts: 12,458
  • kapowblamzkapowblamz Member Posts: 1,587
    VespaPX said:


    Is this cryptic or something? Idk what it means or how it's related.
  • Tikay10Tikay10 Member, Administrator, Moderator Posts: 171,155

    Ha, it lost me, too.
  • CammykazeCammykaze Member Posts: 1,397
    madprof said:

    Cammykaze said:

    Tikay10 said:


    President Trump has a verified account.

    It's terrifying to think hackers could gain control of it. We could be in a war within days.

    Why bother?
    He's managing that all by himself.
    Partly.

    He communicates through Twitter so his words are not mismanaged by media outlets and the verified accounts being hacked is a concern.
    Seriously though guys...if the Donald sent out a twatter saying double your money...FFS who would believe that see u next tuesday!
    I get the impression you are not a fan Professor :)

    Like some things about The Donald and others not as much. He has plenty of people against him so needs someone in his corner in the forum ;)
  • Phantom66Phantom66 Member Posts: 5,542
    The finger of suspicion is on a 21 year old from Liverpool

    https://krebsonsecurity.com/2020/07/whos-behind-wednesdays-epic-twitter-hack/

  • Phantom66Phantom66 Member Posts: 5,542
    The term white hat hacker was misused earlier.

    A hack like this twitter hack would never be a white hat.

    The use of the terms white and black hat hackers are under review by the security community. The terminology is based on the days of black and white cinema when the good guys wore white hats and the baddies black so they could be picked out.

    I prefer the term ethical hacker for white hat which is effectively hacking with the permission of the owner of the system and responsibly disclosing the results to the owner so that problems can be fixed.

    Black hats are simply criminals, while some may claim a moral motive any act that accesses a computer system without permission is against the law (computer misuse act) in the uk and most jurisdictions.
  • kapowblamzkapowblamz Member Posts: 1,587
    Semantics. The jester calls himself grey hat!
  • Tikay10Tikay10 Member, Administrator, Moderator Posts: 171,155
    Phantom66 said:

    The finger of suspicion is on a 21 year old from Liverpool

    https://krebsonsecurity.com/2020/07/whos-behind-wednesdays-epic-twitter-hack/


    That article is stunning, a real eye-opener. There's a whole world out there of which I know nothing.

    I need to check out Amazon Books now to see if I can find any books about this sort of stuff.
  • VespaPXVespaPX Member Posts: 12,458
    And another one:

  • kapowblamzkapowblamz Member Posts: 1,587
    Seems those guys have had mental health issues in the past. Are you saying they were hacked and someone else posted all that ****?
  • Phantom66Phantom66 Member Posts: 5,542

    Semantics. The jester calls himself grey hat!

    Semantics. Yes. The meaning of words, I was just trying to clarify the meaning of white hat hacker. A true grey hat wouldn't do what the Twitter hack did either.

    As for grey hats, there are different definitions but the consensus is it that is someone with "good intentions" who crosses an ethical boundary that a "white hat" would not cross.

    E.g. Breaking in to a system without permission or disclosing how a hack on a particular system works without disclosing that information to the owner of the system.

    Some system owners actively encourage people to try and break their systems as long as they disclose the information to the owners and do not release details without permission and until the problem is fixed. They do this via "bug bounty" schemes.

    Others will threaten legal action against anyone who admits hacking their system, even if they are trying to disclose the hack responsibly. As stated in the earlier post breaking into a system without permission is usually illegal in itself.





  • Phantom66Phantom66 Member Posts: 5,542
    Tikay10 said:

    Phantom66 said:

    The finger of suspicion is on a 21 year old from Liverpool

    https://krebsonsecurity.com/2020/07/whos-behind-wednesdays-epic-twitter-hack/


    That article is stunning, a real eye-opener. There's a whole world out there of which I know nothing.

    I need to check out Amazon Books now to see if I can find any books about this sort of stuff.
    Fascinating to me too, but then I chose to work in the industry so I am a little biased.

    Searching for books on cyber crime and cyber security will throw up a lot of technical books, I have a few suggestions:

    Two early works on cybercrime, both a little dated now but well written. The structure of cybercrime hasn't really changed since but the tactics used do of course change over time with technology advances.

    Spam Nation by Brian Krebs (who wrote the article above, he is a journalist who specialises in cyber crime)

    Dark Market by Misha Glenny (author and journalist who also wrote McMafia among other things)

    Most of my reading to keep up to date is online these days, researcher blogs and white papers etc and more on the technical side. I am not aware of anything equivalent to those above that are as good and more up to date.




  • Tikay10Tikay10 Member, Administrator, Moderator Posts: 171,155

    @Phantom66

    Thanks, will check those out on Amazon.
  • VespaPXVespaPX Member Posts: 12,458

    Seems those guys have had mental health issues in the past. Are you saying they were hacked and someone else posted all that ****?

    Their own posts.
    But with this latest hack, will they now claim they were hacked in the past?
Sign In or Register to comment.