John McAfee, Cyber-Security Pioneer, Says His Twitter Account Was Hacked
Ace computer programmer and businessman John McAfee's has said that his Twitter account was hacked and was used to run 'coin of the day' series recommending and promoting lesser-known cryptocurrencies.
"Though I am a security expert, I have no control over Twitter's security. I have haters. I am a target. People make fake accounts, fake screenshots, fake claims," he tweeted.
"I am a target for hackers who lost money and blame me. Please take responsibility for yourselves. Adults only please," he posted this message with a screenshot of his device which showed his calls and texts were hijacked by a hacker.
According to BBC, McAfee had activated the two-step verification that Twitter has in place as a security feature but "he believed the hacker had intercepted the authentication code."
"The first indication that I had been hacked was turning on my cell phone and seeing the attached image," he was quoted as saying.
"I knew at that point that my phone had been compromised. I was on a boat at the time and could not go to my carrier (AT&T) to have the issue corrected. All that the hacker did was compromise my Twitter account. It could have been worse," McAfee added.
The security pioneer is currently working on plans to sell the world's most "hack-proof" smartphone due for release in February.
For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and subscribe to our YouTube channel.
source - 360
I cherish the way you compose and share your specialty! Exceptionally intriguing and unique! Keep it coming!
ReplyDeletesiber güvenlik
however now the most widely recognized shape that a great many people consider while specifying a security camera is the shot camera. best surveillance systems
ReplyDeleteGreat review! xceptionally intriguing and unique! Keep it coming!
ReplyDeletehttps://www.baneh.com
thanks alot
When you have a spy camera, you are assured that all of your belongings are safe and secured. Aside from that, you will also have the chance to monitor what your nanny has been doing while you are away. Wireless spy camera is one great invention indeed. security camera system installation
ReplyDeleteVery well written post. It will be beneficial to everyone who employess it, as well as myself. Keep up the good work – can’r wait to read more posts. https://www.forbrukeretaten.no
ReplyDeleteOn top of this, the installation of a good system of security will make sure that all valuable machinery and materials are at a far lower risk of being damaged or stolen security guard company
ReplyDeleteBefore you create a website or any account on the wesbites.., you should consider cybersecurity as your priority. This will help you prevent issues later on... andy michael
ReplyDeletehis confinement ought to incorporate individual utilize and use on organization claimed destinations. In any case, be particular. social media groups
ReplyDeleteVery informative post! There is a lot of information here that can help any business get started with a successful social networking campaign. buy lol smurfs
ReplyDeleteGreat Article
ReplyDeleteCyber Security Projects Ideas for CSE
Project Centers in Chennai
JavaScript Training in Chennai
JavaScript Training in Chennai
A large number of the pen cameras that are accessible can transmit up to 180 feet and require next to no light to have the capacity to create a quality picture. http://www.wittyspy.com/
ReplyDeleteSecurity+ training A good blog always comes-up with new and exciting information and while reading I have feel that this blog is really have all those quality that qualify a blog to be a one
ReplyDeleteThis is exceptionally helpful if the portrayals on a few destinations are unclear, on the grounds that you can get more subtleties from progressively different stores.WittySpy.com
ReplyDeleteI was surfing the Internet for information and came across your blog. I am impressed by the information you have on this blog. It shows how well you understand this subject. full color night vision security camera
ReplyDeleteGreat article with excellent idea!Thank you for such a valuable article. I really appreciate for this great information.. bodyguard services Houston TX
ReplyDeleteThe need to disguise them are great to the point that the limitation that wires give can be extraordinary hindrances to making them successfulwatch it here
ReplyDeleteHome surveillance camera frameworks for home insurance are quick demonstrating their esteem. On the off chance that your house is broken into without a framework set up it is hard if certainly feasible for law implementation to discover the guilty party.
ReplyDeletebuilding intercom system upgrade
In the meantime, businesses are making every possible effort to converge mobile and data networks into the cloud architecture. mobile edge computing Techpally
ReplyDelete