Kukes: treason and phishing main causes of stealing celebrity accounts on Twitter




Dr. Mutaz Kukes, an expert in information technology and the fight against cybercrime and the best information technology expert on the Middle East for the year 2013

See artistic phenomenon of increasing piracy accounts for senior actors and actresses, and other celebrities who have accounts on social networking sites Facebook and Twitter not only steal accounts, but beyond that, up to publish photos of fabricated and false news and views about these stars which caused them embarrassment and putting them in crisis and many problems led them to create new accounts and publishing lies via the public offices.

In this regard, said Dr. moutaz Kukes expert technical information and best information technology expert on the Middle East the main causes that lead to penetrate accounts resulting from two main things: first is that many celebrities do not manage their accounts themselves, but turn to set the Admin or more on these accounts and therefore may differ from the account with the account manager, account manager, resorted to stealing the account to the account holder and this is what we call high treason.

He said Dr. moutaz Kukes: the second and most important, is the phenomenon of phishing or booby trap in this case have broken to lure the artist by sending him these messages often contain links to fake links to someone special who follow on Twitter, and this message is often summarised that there are bad things said about him, or that someone was creating obscene … Etc, and the message contains an address Internet page even pressed for news in detail, since the letter arrived from one of the people who follow on Twitter, obviously will raise interest and will pressure the title came with the message. This title, takes a fake Twitter page begins with this address: tvivvter.com first glance would think that Twitter even looked at the page title you won’t notice it because v more than once composed this letter w in the real name for the site twitter.com

As for the Saudi media on Eric and the media recently reported the news of the breakthrough and steal his account and his absence days on Twitter and then returned to Paul and wrote a Tweet thanking Dr. Mutaz Kukes to help him recover his account, said Dr. moutaz Kukes: what happened with the Al is the request for proposal process that someone sent him a letter about the difficult social situation and the need for emergency assistance by virtue of its nature and its immediately open that message and that killed it.

And the following tips for preventing robberies accounts Dr. Mutaz Kukes set of alnsaea rules mainly:

1. e-mail , which is the first thread to any pirate, pirate starts his journey by email to the user trying to decipher his mysteries, which facilitates password retrieval and control the Twitter account, so that the email you register Twitter account it no one knows the secret mail any person should also be effective and not just e-mail mail letters or may be disabled or deleted by the e-mail provider.

2. password : make sure that the password of letters and numbers, use the uppercase and lowercase symbols also entry and minimum password length 12 characters, number and symbol. Also be careful that the password out of your own, such as your name, phone number, etc.

3. Activate the entry confirmation from Twitter property: this property is unlike some activation via mobile phone features available in all States. They are wonderful and will add you to the level of safety railing

4. If you select set account supervisor, be sure to write a contract and binding document and a written undertaking that ensures the moral obligation to all account and لايسئ use

5. don’t skim your account from any computer, and an Internet café. Browse from your PC only after software update online protection

6. review the applications associated with your account on Twitter and do not allow any application can see the password that is associated with your account, such as those applications that talk about knowing your followers or similar

7. do not follow anyone not know especially if prompted, do not follow the others whom you know only when sure of their identity, particularly with the proliferation of fake accounts

8. the need to the attention of Twitter applications on your Smartphone and fortify your particular Android hack using the protection programmes.
Related topics:

Phishing email,


Tags: , , , , , , , , , , , , , , , , , , ,

In: Technology & Gadgets Asked By: [15500 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »