Twitter Hackers Serving Up Extra Large Combos with Burger King

Twitter Hackers Serving Up Extra Large Combos with Burger King

Wouldn’t it be nice to log into Twitter and see an extra 60,000 followers? That’s exactly what happened to Burger King: people began following their account by the tens of thousands. Were they giving away Whoppers? Nope. Hmmm, something seemed a little fishy…fishier than Burger King’s Premium Alaskan Fish Sandwich. Where did all these new followers come from?

Come to find out, Burger King’s Twitter account had been hacked. Before their account was compromised, Burger King had about 50,000 followers but after being hacked, the followers increased to more than 110,000.

It was unclear who was responsible for the hack, but it did demonstrate how quickly a company’s outreach to their loyal fans can turn into an embarrassing situation. At one point, Burger King’s profile message said that they had been sold to McDonald’s, obviously a direct competitor, because the Whopper, Burger King’s flagship sandwich, had flopped.

At another point during the account hacking, McDonald’s tweeted: “We empathize with our @BurgerKing counterparts. Rest assured, we had nothing to do with the hacking.”

So, how did the hijacking happen? To my knowledge, no official reports have been released; however, remember how Twitter is accessed with a username and password? Well, if a person’s computer is infected with malicious software, it is easy for hackers to hijack accounts. Not saying that this is what happened, but it could be one plausible explanation.

Other social media platforms (Facebook and YouTube) offer two-factor authentication, providing greater security because it requires something in addition to a password, like a code sent by text message to a registered mobile device. If Twitter had this type of authentication, hackers would have been forced to get past two layers of security instead of only one.

We may never know the truth as to how or who actually hacked into Burger King’s Twitter account; however, one truth we do know is social media security is a huge issue that can cause major problems.

(Reference: http://www.cbsnews.com/8301-205_162-57569911/burger-king-twitter-hacked-posting-under-mcdonalds/

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • 2024 Security Today New Product of the Year Award Winners Announced

    More than 20 companies are being recognized this year for products that help keep us safe. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3