Skip to content

Sorin Mustaca's blog

Cybersecurity, Automotive Security, Antimalware Software, Product Management, Agile, AI, Secure Software Development, SSDLC

  • Security
    • IT Security News English
    • IT Sicherheit News Deutsch
    • Securitate in limba Romana
    • Tipps und Ratschläge – IT Sicherheit
  • News
    • In the news
    • Quoted
  • About
    • About me
    • Contact
    • “Improve your security” free eBook
    • Scuba Diving Blog
  • Privacy Policy
  • Cyber Security Consulting
  • Automotive Cybersecurity
  • Home
  • News
  • Twitter fails in an endless loop with their purge initiative

Twitter fails in an endless loop with their purge initiative

August 1, 2018August 1, 2018

I am having troubles with Twitter… They have suspended my account @sorinmustaca and there is no way I can get it back.

Also the @it_securitynews is being constantly blocked, but I can unblock it.

 

Background:

If you read the news, you may have heard that Twitter is closing millions and millions of accounts.

According to this article in Washington Post, Twitter suspended more than 70 million accounts in May and June, and the pace has continued in July.

The rate of account suspensions, which Twitter confirmed to The Post, has more than doubled since October, when the company revealed under congressional pressure how Russia used fake accounts to interfere in the U.S. presidential election. Twitter suspended more than 70 million accounts in May and June, and the pace has continued in July, according to the data.

 

What does this have to do with me and my suspended account?

My account is used to publish the news from IT Security News – www.itsecuritynews.info and everything is done automatically.

This seems to trigger some automatic mechanisms, which signal Twitter to block my accounts.

However, there is a bug in their blocking page.

If you try to login into a suspended account, you end up in a loop, which basically prevents you to do anything else with twitter.com.

The only solution is to manually erase the cookies and start fresh with another account.

 

 

Shame on you Twitter!

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Threads (Opens in new window) Threads
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • More
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pinterest (Opens in new window) Pinterest

Like this:

Like Loading...

Related

NewsTagged: account, blocked, endless loop, fail, it security news, suspended, twitter

Post navigation

“Independent” support hotlines and how to deal with them (updated: who is in the picture?)
Another Google Support Phishing? No…

Related Posts

Understanding Defense in Depth in IT Security

The recent outage caused by Crowdstrike’s faulty update has create a lot of discussions. I wrote a post on LinkedIn where I asked the readers why are IT professionals using Crowdstrike on some systems that shouldn’t be in need of such protection in the first place. The answers in various groups were mostly related to: […]

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Threads (Opens in new window) Threads
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • More
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pinterest (Opens in new window) Pinterest

Like this:

Like Loading...
Virus Bulletin 2009 Conference Reports

Day 1 : http://techblog.avira.com/2009/09/24/vb-conference-day-1/en/ Day 2 : http://techblog.avira.com/2009/09/25/vb-conference-day-2/en/ Day 3 : http://techblog.avira.com/2009/09/28/vb-conference-day-3/en/

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Threads (Opens in new window) Threads
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • More
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pinterest (Opens in new window) Pinterest

Like this:

Like Loading...
Windows 10 and “we own you”: questionable default privacy settings

First thing you see after the Windows 10 migration is done is the “Customize Settings” dialog below. In a few words, Microsoft is trying to “own” the user that just got the “best OS of all times”, at least according to Microsoft. 1. Just turn everything OFF       2. Let “Smart Screen” ON, […]

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Threads (Opens in new window) Threads
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • More
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pinterest (Opens in new window) Pinterest

Like this:

Like Loading...
Sorin Mustaca on Twitter Sorin Mustaca on Facebook View Sorin Mustaca's profile on LinkedIn Sorin Mustaca on XING
Subscribe to me on Substack

Categories

My company

Endpoint Cybersecurity

www.endpoint-cybersecurity.com

- Consulting in building your security products
- Android and IOS security software
- Pentests and Security tests for applications
- Cybersecurity Management Systems for Automotive(CSMS/ISO 21434, WP.29, ISO 16949)
- Support in TISAX(r) audits
- Support in NIS2 audits
- Support in CRA audits

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 149 other subscribers

My free Ebook

Top Posts & Pages

  • Implementing ISO 27001:2022 Annex A.18 - Compliance
  • Sign files unattended in batch mode while having an eToken (no password popup!) (updated)
  • Defender Application Control or Defender SmartScreen - what can you do to not be blocked by it
  • NIS2: 1. Perform a gap analysis
  • TISAX: new Catalogue ISA v6 available
  • Understanding ISO 27001:2022 Annex A.8 - Asset Management
  • Understanding ISO 27001:2022 Annex A.14 - System Acquisition, Development, and Maintenance
  • How to implement an Information Security Management System (ISMS)
  • Implementing ISO 27001:2022 Annex A.16 - Information Security Incident Management

Pages

  • About
  • Contact
  • Cybersecurity and AI Collection
  • Download the free eBook
  • In the news
  • ISO 27001:2022 Collection
  • NIS2 Collection
  • Privacy Policy
  • Securitate in limba Romana
  • Tipps und Ratschläge – IT Sicherheit
RSS IT Security News (EN)
  • Fake “Notepad++ for Mac” Site May Pose Malware Risk for Mac Users
  • Apache HTTP Server Vulnerability Exposes Millions to Remote Code Execution Threats
  • Microsoft Edge Found Storing Saved Passwords in Cleartext Memory at Startup
  • DigiCert Hacked in Screensaver-Based Attack to Fraudulently Obtain EV Code Signing Certificates
  • pnpm 11 Enables Default Release-Age Guard to Curb npm Supply Chain Attacks
  • Critical Apache HTTP Server Flaw Exposes Millions of Servers to RCE Attacks
  • Microsoft Edge Stores All Saved Passwords in Cleartext Process Memory at Launch
  • Global Surge in Military Grade Spyware Puts Personal Smartphones at Risk
  • IT Security News Hourly Summary 2026-05-05 06h : 4 posts
  • Scientists just created exotic new forms of matter that shouldn’t exist
RSS IT Sicherheitsnews (DE)
  • IT Sicherheitsnews taegliche Zusammenfassung 2026-05-05 00h : 1 posts
  • IT Sicherheitsnews taegliche Zusammenfassung 2026-05-04
  • Logo und Namen einfach kopiert: Notepad++ für Mac nicht autorisiert
  • IT Sicherheitsnews taegliche Zusammenfassung 2026-05-04 18h : 3 posts
  • Manager halten ihre IT für sicherer als sie ist
RSS Improve Your Security Ebook
  • Protecting Our Teens: A Guide to Creating Awareness About Online Dangers
  • A Guide to Teaching Online Safety and Navigating Cyber Dangers
  • How to easily secure your smartphone
  • Conclusion: The Ultimate Parent Guide for Protecting Your Child on the Internet
  • Online predators: The Ultimate Parent Guide for Protecting Your Child on the Internet

Copyright © 2025 - 2026 Sorin Mustaca's blog | Marvel Blog by Ascendoor | Powered by WordPress.

 

Loading Comments...
 

You must be logged in to post a comment.

    %d