Twitter said that its data has not been breached, and LeakedSource explained that Twitter user credentials and passwords might have been gotten from browsers that store passwords. The full story is on Time.
“In a blog post, LeakedSource said the dataset included passwords from people who had signed up to Twitter as recently as 2014, but the passwords had been stored in “plaintext,” with no attempt to encrypt them. In line with being a large, prominent web firm, Twitter isn’t so careless with its customers’ data.”
The article goes on to explain that passwords might have been obtained when people allow their browser to keep track of their passwords.
Most of the Twitter data seemed to be from accounts in Russia, but it’s always better to be safe than sorry.
Michael C. Ford thought he was sophisticated in how he terrorized young women on the internet. His methods however, resulted in federal charges of interstate threats, fraud in connection with computers, wire fraud, and cyberstalking.
Some of us are familiar with the threats, being on the receiving end. They are threats that unless you do what the perpetrator wants, that they will post your personal information on the internet. Many times, that is combined with claiming to have some type of “public document” and misrepresenting it so they can demean and mock.
Michael C. Ford however, did not use “public documents” as a threat against his victims. He hacked into protected accounts on the internet and obtained sexual photos of his victims. The 17 page warrant is an interesting read.
Ford used various Google email addresses to make contact with a woman, reported to be 18-years old, letting her know that he had obtained some sexually compromising photos of her, and that he also knew her real name and address. He demanded that she take videos of other girls undressing and/or nude, and send them to him or he would release the photos to her family and friends, and post them on the internet along with her personal information.