Twitter hack pays off, brings Burger King 60K new followers
Computerworld - Burger King saw a surprising upside after its Twitter stream was recently compromised: Tens of thousands of people began following its account.
The company had about 50,000 followers before the hack, but that number shot up to more than 110,000 after the incident. "Interesting day here at Burger King, but we're back!" Burger King tweeted. "Welcome to our new followers. Hope you all stick around!"
Twitter promotes its platform as a tool that companies can use to reach out to customers. But this incident turned that model on its head: Outreach efforts led to embarrassment with the hack, but then the apparent security breakdown aided outreach by generating new contacts with potential customers.
At one point, Burger King's profile message said that the company had been sold to McDonald's.
McDonald's denied involvement, tweeting, "We empathize with our @BurgerKing counterparts.... We had nothing to do with the hacking." It was unclear who was responsible.
In early February, Twitter said its servers had been breached by "extremely sophisticated" hackers who may have made off with the names and passwords of 250,000 users.
This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.
Read more about Internet in Computerworld's Internet Topic Center.
- Social Media Education: The New Edge for Success Failure to train for social media will cost your business money. A recent report showed how digitally prepared companies can unlock up to...
- Social Media in Technology: A Unified Strategy for Success Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming...
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Internet White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!