Twitter blog post says company leaked no user data
Post comes after some 59,000 login and password combinations from user accounts are posted online
IDG News Service - None of the recently leaked Twitter logins and passwords came from within the company, according to a message posted on Twitter's Japanese blog Thursday.
"We have confirmed that no one's information has been leaked from Twitter," the blog said, after apologizing to users for their concerns.
The comments came after 58,978 login and password combinations were published Monday to Pastebin, a website designed to share programming code but often used by hackers to show off stolen information. The company had already said that much of the account information posted was duplicates, unmatched login credentials and spam accounts.
In its Japanese blog posting, Twitter said that account information had likely been leaked from a different site, and it had sent password reset requests to users on the list.
It also warned users to avoid "fishing" Web sites, which try to con login information out of unwary surfers, and to use strong passwords that are unique for separate sites.
In the days since the leak became public, security analysts and hackers had questioned how legitimate the list was, as many of the users on it had few followers and there were no well-known figures on the list.
Still, the issue is a touchy one for Twitter, as it is working under a deal with the U.S. Federal Trade Commission to protect user privacy. The deal was made after the site suffered hacks in 2009 that left prominent Tweeters such as President Obama with no control over their accounts.
- Social Media Education: The New Edge for Success Failure to train for social media will cost your business money. A recent report showed how digitally prepared companies can unlock up to...
- Social Media in Technology: A Unified Strategy for Success Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming...
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Internet White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!