Twitter AAAPI Bug to Open Access to Users' Messages

Due to glitch in Account Activity API, a copy of a private message was sent to a random recipient 
25 September 2018   884

On September 10, 2018, Twitter detected a bug in the Account Activity API (AAAPI) sending a copy of a private message to a random recipient. The company officially stated that the error affected less than 1% of users. The developers fixed the problem within a few hours of detection. Currently Twitter sends notification to potential victims and works to neutralize possible damage.

The Account Activity API is designed to communicate with developers on the Twitter platform. Using this interface, contractors can send private messages to each other. The detected error led to the fact that, at the confluence of certain circumstances, information and tweets of clients came to third-party destinations. A bug in the interface existed in May 2017 and could affect any interactions over the past 16 months.

Twitter states that only officially registered developers could receive random messages. Currently, there is correspondence with possible recipients. Representatives of the company promise to monitor the developers' compliance with their obligations and make sure that the information received is illegally received.

Problems of information leakage due to developer errors or hacker attacks regularly pop up in the IT field. In early September, 2018, Family Orbit, a company specializing in the hidden control of user actions, allowed a leakage of 281 gigabytes of data obtained during the surveillance process.

Ethereum Services to be Under New Thread

At the moment, the vulnerability has already been fixed, hackers did not have time to use it
05 February 2019   290

Specialists from the blockchain-startup Parity Technologies have discovered a vulnerability in the JSONRPC protocol that threatens the security of the entire Ethereum ecosystem. In particular, MyEtherWallet, MyCrypto and Infura services are under threat of hacking.

At the moment, the problem has already been fixed, the attackers did not have time to use it.

The developers of Parity Technologies recommended that users update the nodes to the new software version in order to reduce the risk of losing access to decentralized applications.

Recall that in January, due to the critical vulnerability in improving the EIP-1283, which allows hackers to steal user funds, the hardfork network was postponed indefinitely
Ethereum Constantinople.