Skip to content

Sorin Mustaca's blog

Cybersecurity, Automotive Security, Antimalware Software, Product Management, Agile, AI, Secure Software Development, SSDLC

  • Security
    • IT Security News English
    • IT Sicherheit News Deutsch
    • Securitate in limba Romana
    • Tipps und Ratschläge – IT Sicherheit
  • News
    • In the news
    • Quoted
  • About
    • About me
    • Contact
    • “Improve your security” free eBook
    • Scuba Diving Blog
  • Privacy Policy
  • Cyber Security Consulting
  • Automotive Cybersecurity
  • Home
  • News
  • Twitter fails in an endless loop with their purge initiative

Twitter fails in an endless loop with their purge initiative

August 1, 2018August 1, 2018

I am having troubles with Twitter… They have suspended my account @sorinmustaca and there is no way I can get it back.

Also the @it_securitynews is being constantly blocked, but I can unblock it.

 

Background:

If you read the news, you may have heard that Twitter is closing millions and millions of accounts.

According to this article in Washington Post, Twitter suspended more than 70 million accounts in May and June, and the pace has continued in July.

The rate of account suspensions, which Twitter confirmed to The Post, has more than doubled since October, when the company revealed under congressional pressure how Russia used fake accounts to interfere in the U.S. presidential election. Twitter suspended more than 70 million accounts in May and June, and the pace has continued in July, according to the data.

 

What does this have to do with me and my suspended account?

My account is used to publish the news from IT Security News – www.itsecuritynews.info and everything is done automatically.

This seems to trigger some automatic mechanisms, which signal Twitter to block my accounts.

However, there is a bug in their blocking page.

If you try to login into a suspended account, you end up in a loop, which basically prevents you to do anything else with twitter.com.

The only solution is to manually erase the cookies and start fresh with another account.

 

 

Shame on you Twitter!

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Threads (Opens in new window) Threads
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • More
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...

Related

NewsTagged: account, blocked, endless loop, fail, it security news, suspended, twitter

Post navigation

“Independent” support hotlines and how to deal with them (updated: who is in the picture?)
Another Google Support Phishing? No…

Related Posts

Sidejacking and Wi-Fi security

Avira – TechBlog : Sidejacking and Wi-Fi security All started with this article written by Byron Acohido from USA Today: http://lastwatchdog.com/firesheep-wi-fi-eavesdropper-works-mcdonalds-starbucks/ Then I wrote the article in the Techblog based on the feedback I provided to Byron.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Threads (Opens in new window) Threads
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • More
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Spam description with my name in it

John Graham Cumming is maintaining his Spammer’s Compendium and he is giving names to spam techniques. I reported some time ago one technique used in PayPal phishing emails and he created a method: Cross your fingers and click (UH!Mustaca!HTML) What: Making what looks like a valid link to PayPal turn into a link to a […]

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Threads (Opens in new window) Threads
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • More
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Colorful Spam twist for bypassing Spamfilters

A new technique to avoid spam filters: http://techblog.avira.com/2009/03/25/colorful-spam-twist-for-bypassing-spamfilters/en/ The technique will be added here as well: http://www.virusbtn.com/resources/spammerscompendium/colormatrix.xml

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Threads (Opens in new window) Threads
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • More
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Sorin Mustaca on Twitter Sorin Mustaca on Facebook View Sorin Mustaca's profile on LinkedIn Sorin Mustaca on XING
Subscribe to me on Substack

Categories

My company

Endpoint Cybersecurity

www.endpoint-cybersecurity.com

- Consulting in building your security products
- Android and IOS security software
- Pentests and Security tests for applications
- Cybersecurity Management Systems for Automotive(CSMS/ISO 21434, WP.29, ISO 16949)
- Support in TISAX(r) audits
- Support in NIS2 audits
- Support in CRA audits

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 149 other subscribers

My free Ebook

Top Posts & Pages

  • Implementing ISO 27001:2022 Annex A.18 - Compliance
  • Sign files unattended in batch mode while having an eToken (no password popup!) (updated)
  • Defender Application Control or Defender SmartScreen - what can you do to not be blocked by it
  • NIS2: 1. Perform a gap analysis
  • TISAX: new Catalogue ISA v6 available
  • Understanding ISO 27001:2022 Annex A.8 - Asset Management
  • Understanding ISO 27001:2022 Annex A.14 - System Acquisition, Development, and Maintenance
  • How to implement an Information Security Management System (ISMS)
  • Implementing ISO 27001:2022 Annex A.16 - Information Security Incident Management

Links

"Improve your security" - free eBook
IT Security News
Deutsche Version IT Security News
Endpoint Cybersecurity GmbH
Chat GPT

Pages

  • About
  • Apps
  • Contact
  • Cybersecurity and AI Collection
  • Download the free eBook
  • In the news
  • ISO 27001:2022 Collection
  • NIS2 Collection
  • Privacy Policy
  • Securitate in limba Romana
  • Stupid spams or maybe created for a different target
  • Tipps und Ratschläge – IT Sicherheit
RSS IT Security News (EN)
  • Hackers Can Leverage Grok and Copilot for Stealthy Malware Communication and Control
  • A Busy Week for Cybersecurity Speaking Engagements
  • ISC Stormcast For Thursday, February 19th, 2026 https://isc.sans.edu/podcastdetail/9816, (Thu, Feb 19th)
  • Microsoft: Critical Windows Admin Center Flaw Allows Privilege Escalation
  • Adidas investigates third-party data breach after criminals claim they pwned the sportswear giant
  • From Firewall Management to Adaptive Security: What IDC’s 2026 Report Means for Security Leaders
  • Why I Finally Made Peace With the Term Zero Trust
  • IT Security News Hourly Summary 2026-02-19 00h : 8 posts
  • IT Security News Daily Summary 2026-02-18
  • Hacking conference Def Con bans three people linked to Epstein
RSS IT Sicherheitsnews (DE)
  • IT Sicherheitsnews taegliche Zusammenfassung 2026-02-19 00h : 1 posts
  • IT Sicherheitsnews taegliche Zusammenfassung 2026-02-18
  • KI-gestützter Admin-Zugriff in nur 8 Minuten
  • Gemini: Googles KI-Chatbot generiert jetzt eigenständig KI-Musik
  • IT Sicherheitsnews taegliche Zusammenfassung 2026-02-18 18h : 2 posts
RSS Improve Your Security Ebook
  • Protecting Our Teens: A Guide to Creating Awareness About Online Dangers
  • A Guide to Teaching Online Safety and Navigating Cyber Dangers
  • How to easily secure your smartphone
  • Conclusion: The Ultimate Parent Guide for Protecting Your Child on the Internet
  • Online predators: The Ultimate Parent Guide for Protecting Your Child on the Internet

Copyright © 2025 - 2026 Sorin Mustaca's blog | Marvel Blog by Ascendoor | Powered by WordPress.

 

Loading Comments...
 

You must be logged in to post a comment.

    %d