Skip to content

Sorin Mustaca on Cybersecurity

Thoughts on Cybersecurity, Automotive Security, Antimalware Software, Product Management, Agile, AI, Secure Software Development, SSDLC

  • Security
    • IT Security News English
    • IT Sicherheit News Deutsch
    • Securitate in limba Romana
    • Tipps und Ratschläge – IT Sicherheit
  • News
    • In the news
    • Quoted
  • About
    • About me
    • Contact
    • “Improve your security” free eBook
    • Scuba Diving Blog
  • Privacy Policy
  • Cyber Security Consulting
  • Automotive Cybersecurity
  • Home
  • News
  • Twitter fails in an endless loop with their purge initiative

Twitter fails in an endless loop with their purge initiative

August 1, 2018August 1, 2018

I am having troubles with Twitter… They have suspended my account @sorinmustaca and there is no way I can get it back.

Also the @it_securitynews is being constantly blocked, but I can unblock it.

 

Background:

If you read the news, you may have heard that Twitter is closing millions and millions of accounts.

According to this article in Washington Post, Twitter suspended more than 70 million accounts in May and June, and the pace has continued in July.

The rate of account suspensions, which Twitter confirmed to The Post, has more than doubled since October, when the company revealed under congressional pressure how Russia used fake accounts to interfere in the U.S. presidential election. Twitter suspended more than 70 million accounts in May and June, and the pace has continued in July, according to the data.

 

What does this have to do with me and my suspended account?

My account is used to publish the news from IT Security News – www.itsecuritynews.info and everything is done automatically.

This seems to trigger some automatic mechanisms, which signal Twitter to block my accounts.

However, there is a bug in their blocking page.

If you try to login into a suspended account, you end up in a loop, which basically prevents you to do anything else with twitter.com.

The only solution is to manually erase the cookies and start fresh with another account.

 

 

Shame on you Twitter!

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...

Related

NewsTagged: account, blocked, endless loop, fail, it security news, suspended, twitter

Post navigation

“Independent” support hotlines and how to deal with them (updated: who is in the picture?)
Another Google Support Phishing? No…

Related Posts

“Not all AV software are the same” – CompTIA Security+ 2008

CompTIA Security+ 2008, page 99, Chapter Antivirus Not all AV software is the same. Free AV software that is available for download through the Internet will typically only look for viruses in standard files. However, most commercial AV software will also look for Trojans, worms, macro viruses, and adware in standard files as well as […]

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Spotify hacked – there are some things we’re not supposed to know

Spotify has become now part of the bigger and bigger group of companies that had their internal network hacked. In an announcement to all users, Spotify says they became aware of some unauthorized access to their systems and internal company data. This is all good, but what exactly has been accessed? Further on, in the blog […]

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Are the AntiVirus companies writing the Viruses?

Short answer: NO Long answer: a very good one provided by Randy Abrams Thanks for the great article, Randy !

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Sorin Mustaca on Twitter Sorin Mustaca on Facebook View Sorin Mustaca's profile on LinkedIn Sorin Mustaca on XING
Subscribe to me on Substack

Categories

My company

Endpoint Cybersecurity

www.endpoint-cybersecurity.com

- Consulting in building your security products
- Android and IOS security software
- Pentests and Security tests for applications
- Cybersecurity Management Systems for Automotive(CSMS, ISO 21434, WP.29, ISO 16949)
- Support in TISAX audits
- Support in NIS2 audits

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 155 other subscribers

My free Ebook

Top Posts & Pages

  • Implementing ISO 27001:2022 Annex A.18 - Compliance
  • Sign files unattended in batch mode while having an eToken (no password popup!) (updated)
  • Defender Application Control or Defender SmartScreen - what can you do to not be blocked by it
  • NIS2: 1. Perform a gap analysis
  • TISAX: new Catalogue ISA v6 available
  • Understanding ISO 27001:2022 Annex A.8 - Asset Management
  • Understanding ISO 27001:2022 Annex A.14 - System Acquisition, Development, and Maintenance
  • How to implement an Information Security Management System (ISMS)
  • Implementing ISO 27001:2022 Annex A.16 - Information Security Incident Management

Links

"Improve your security" - free eBook
IT Security News
Deutsche Version IT Security News
Endpoint Cybersecurity GmbH
Chat GPT

Pages

  • About
  • Apps
  • Contact
  • Cybersecurity and AI Collection
  • Download the free eBook
  • In the news
  • ISO 27001:2022 Collection
  • NIS2 Collection
  • Privacy Policy
  • Securitate in limba Romana
  • Stupid spams or maybe created for a different target
  • Tipps und Ratschläge – IT Sicherheit
RSS IT Security News (EN)
  • Paragon Graphite Spyware used a zero-day exploit to hack at least two journalists’ iPhones
  • WiredBucks – 918,529 breached accounts
  • Datadog AI agent observability, security seek to boost trust
  • OffensiveCon25 – Keynote: Automating Your Job? The Future Of AI and Exploit Development
  • Randall Munroe’s XKCD ‘Neighbor-Source Heat Pump’
  • LinuxFest Northwest: LFNW 2025: In The Beginning…
  • Secure Your Enterprise with Robust DNS: A Guide to NIST SP 800-81r3
  • Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware
  • How to Protest Safely in the Age of Surveillance
  • IT Security News Hourly Summary 2025-06-12 21h : 8 posts
RSS IT Sicherheitsnews (DE)
  • Mark Zuckerberg will ein "Superintelligenz"-Team: 9 Vorschläge, wen er aufnehmen sollte
  • Europas KI-Zukunft: Digitale Souveränität braucht mehr als Nvidia-Chips
  • Zehn Stunden ohne ChatGPT: Warum der Ausfall der KI ein Warnzeichen ist
  • IT Sicherheitsnews taegliche Zusammenfassung 2025-06-12 15h : 2 posts
  • Mehr als Sonnenschutz: Sicherheitsrollläden gegen Einbruch und Lawinen
RSS Improve Your Security Ebook
  • Protecting Our Teens: A Guide to Creating Awareness About Online Dangers
  • A Guide to Teaching Online Safety and Navigating Cyber Dangers
  • How to easily secure your smartphone
  • Conclusion: The Ultimate Parent Guide for Protecting Your Child on the Internet
  • Online predators: The Ultimate Parent Guide for Protecting Your Child on the Internet

Copyright © 2000 - 2025 Sorin Mustaca on Cybersecurity | Marvel Blog by Ascendoor | Powered by WordPress.

 

Loading Comments...
 

You must be logged in to post a comment.

    %d