Skip to content

Sorin Mustaca's blog

Cybersecurity, Automotive Security, Antimalware Software, Product Management, Agile, AI, Secure Software Development, SSDLC

  • Security
    • IT Security News English
    • IT Sicherheit News Deutsch
    • Securitate in limba Romana
    • Tipps und Ratschläge – IT Sicherheit
  • News
    • In the news
    • Quoted
  • About
    • About me
    • Contact
    • “Improve your security” free eBook
    • Scuba Diving Blog
  • Privacy Policy
  • Cyber Security Consulting
  • Automotive Cybersecurity
  • Home
  • News
  • Twitter fails in an endless loop with their purge initiative

Twitter fails in an endless loop with their purge initiative

August 1, 2018August 1, 2018

I am having troubles with Twitter… They have suspended my account @sorinmustaca and there is no way I can get it back.

Also the @it_securitynews is being constantly blocked, but I can unblock it.

 

Background:

If you read the news, you may have heard that Twitter is closing millions and millions of accounts.

According to this article in Washington Post, Twitter suspended more than 70 million accounts in May and June, and the pace has continued in July.

The rate of account suspensions, which Twitter confirmed to The Post, has more than doubled since October, when the company revealed under congressional pressure how Russia used fake accounts to interfere in the U.S. presidential election. Twitter suspended more than 70 million accounts in May and June, and the pace has continued in July, according to the data.

 

What does this have to do with me and my suspended account?

My account is used to publish the news from IT Security News – www.itsecuritynews.info and everything is done automatically.

This seems to trigger some automatic mechanisms, which signal Twitter to block my accounts.

However, there is a bug in their blocking page.

If you try to login into a suspended account, you end up in a loop, which basically prevents you to do anything else with twitter.com.

The only solution is to manually erase the cookies and start fresh with another account.

 

 

Shame on you Twitter!

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...

Related

NewsTagged: account, blocked, endless loop, fail, it security news, suspended, twitter

Post navigation

“Independent” support hotlines and how to deal with them (updated: who is in the picture?)
Another Google Support Phishing? No…

Related Posts

Ubuntu Desktop 9.10 (Karmik-Koala) – install 32 bits libraries on a 64 bits operating system

You have most probably 4 GB RAM and you want to use them all 🙂 The only choice for you is to install Ubuntu 64 bits. But, a lot of software goodies out there are still compiled on 32 bits. Of course, they won’t start on your brand new 64 bits operating system that can […]

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Microsoft Defender and dangerous alert levels

Description: This program changes various computer settings. Advice: This software is typically benign when it runs on your computer, unless it was installed without your knowledge. If you’re not sure whether to permit it, review the alert details or check if you recognize and trust the publisher of the software. Category: Tool       […]

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
9 Things That Motivate Employees More Than Money (guest post)

Original post: http://www.inc.com/ilya-pozin/9-things-that-motivate-employees-more-than-money.html   Author:  Ilya Pozin     Be generous with praise. Everyone wants it and it’s one of the easiest things to give. Plus, praise from the CEO goes a lot farther than you might think. Praise every improvement that you see your team members make. Once you’re comfortable delivering praise one-on-one to an employee, try […]

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Sorin Mustaca on Twitter Sorin Mustaca on Facebook View Sorin Mustaca's profile on LinkedIn Sorin Mustaca on XING
Subscribe to me on Substack

Categories

My company

Endpoint Cybersecurity

www.endpoint-cybersecurity.com

- Consulting in building your security products
- Android and IOS security software
- Pentests and Security tests for applications
- Cybersecurity Management Systems for Automotive(CSMS/ISO 21434, WP.29, ISO 16949)
- Support in TISAX(r) audits
- Support in NIS2 audits
- Support in CRA audits

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 149 other subscribers

My free Ebook

Top Posts & Pages

  • Implementing ISO 27001:2022 Annex A.18 - Compliance
  • Sign files unattended in batch mode while having an eToken (no password popup!) (updated)
  • Defender Application Control or Defender SmartScreen - what can you do to not be blocked by it
  • NIS2: 1. Perform a gap analysis
  • TISAX: new Catalogue ISA v6 available
  • Understanding ISO 27001:2022 Annex A.8 - Asset Management
  • Understanding ISO 27001:2022 Annex A.14 - System Acquisition, Development, and Maintenance
  • How to implement an Information Security Management System (ISMS)
  • Implementing ISO 27001:2022 Annex A.16 - Information Security Incident Management

Links

"Improve your security" - free eBook
IT Security News
Deutsche Version IT Security News
Endpoint Cybersecurity GmbH
Chat GPT

Pages

  • About
  • Apps
  • Contact
  • Cybersecurity and AI Collection
  • Download the free eBook
  • In the news
  • ISO 27001:2022 Collection
  • NIS2 Collection
  • Privacy Policy
  • Securitate in limba Romana
  • Stupid spams or maybe created for a different target
  • Tipps und Ratschläge – IT Sicherheit
RSS IT Security News (EN)
  • Anatomy of an Attack: The Payroll Pirates and the Power of Social Engineering
  • IT Security News Hourly Summary 2026-01-17 00h : 2 posts
  • IT Security News Daily Summary 2026-01-16
  • Sonatype Named DevOps Dozen Winner for Best DevSecOps Solution
  • Vulnerability in Anthropic’s Claude Code Shows Up in Cowork
  • Implementing data governance on AWS: Automation, tagging, and lifecycle strategy – Part 1
  • Implementing data governance on AWS: Automation, tagging, and lifecycle strategy – Part 2
  • IT Security News Hourly Summary 2026-01-16 21h : 8 posts
  • Dangling DNS: The Most Overlooked Attack Surface in the AI Era
  • IT Asset, Vulnerability, and Patch Management Best Practices
RSS IT Sicherheitsnews (DE)
  • IT Sicherheitsnews taegliche Zusammenfassung 2026-01-17 00h : 1 posts
  • IT Sicherheitsnews taegliche Zusammenfassung 2026-01-16
  • Forscher trainieren KI auf Sicherheitslücken – und die produziert plötzlich Mordphantasien
  • Die lernende Bedrohung: Predator-Spyware ist raffinierter als gedacht
  • KI-Studie: Künstliche Intelligenz macht mehr als erwartet – und das ist ein Problem
RSS Improve Your Security Ebook
  • Protecting Our Teens: A Guide to Creating Awareness About Online Dangers
  • A Guide to Teaching Online Safety and Navigating Cyber Dangers
  • How to easily secure your smartphone
  • Conclusion: The Ultimate Parent Guide for Protecting Your Child on the Internet
  • Online predators: The Ultimate Parent Guide for Protecting Your Child on the Internet

Copyright © 2025 - 2026 Sorin Mustaca's blog | Marvel Blog by Ascendoor | Powered by WordPress.

 

Loading Comments...
 

You must be logged in to post a comment.

    %d