Twitter tormented by nettlesome computer program

Apr 13, 2009

(AP) -- A nettlesome computer program that tormented Twitter over the weekend is another reminder of the challenges facing the rapidly growing online communications service.

The mischievous program, known as a "worm," targeted Twitter's network with four different attacks starting early Saturday and ending early Monday, according to Twitter co-founder Biz Stone.

The worm was a potentially designed to automatically reproduce itself once it's clicked on. But Stone says it didn't filch any personal information from the more than 6 million people with accounts.

©2009 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Explore further: UK: Former reporter sentenced for phone hacking

add to favorites email to friend print save as pdf

Related Stories

Twitter to try money-making methods

Mar 27, 2009

Micro-blogging sensation Twitter plans to begin dabbling this year with ways to pump cash from the fast-growing free service.

Crystal Cathedral: OMG! Poser tweets as Schuller

Mar 26, 2009

(AP) -- Televangelist Robert H. Schuller has reached millions worldwide with his weekly "Hour of Power" TV broadcasts, but when it comes to the Internet, he had a high-tech headache: an online impostor.

British pupils to get lessons on Twitter: report

Mar 25, 2009

Children in British junior schools could soon be taking lessons in Internet applications like Twitter under proposals to change school curriculums, the Guardian newspaper reported Wednesday.

AT&T and union continue negotiating

Apr 06, 2009

(AP) -- AT&T and its largest union are continuing negotiations after contracts covering tens of thousands of workers expired this weekend.

Recommended for you

UK: Former reporter sentenced for phone hacking

5 hours ago

(AP)—A former British tabloid reporter was given a 10-month suspended prison sentence Thursday for his role in the long-running phone hacking scandal that shook Rupert Murdoch's media empire.

Evaluating system security by analyzing spam volume

5 hours ago

The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company's spam volume to evaluate its security vulnerability through the SpamRankings.net ...

Surveillance a part of everyday life

6 hours ago

Details of casual conversations and a comprehensive store of 'deleted' information were just some of what Victoria University of Wellington students found during a project to uncover what records companies ...

European Central Bank hit by data theft

7 hours ago

(AP)—The European Central Bank said Thursday that email addresses and other contact information have been stolen from a database that serves its public website, though it stressed that no internal systems or market-sensitive ...

Twitter admits to diversity problem in workforce

9 hours ago

(AP)—Twitter acknowledged Wednesday that it has been hiring too many white and Asian men to fill high-paying technology jobs, just like several other major companies in Silicon Valley.

Social Security spent $300M on 'IT boondoggle'

21 hours ago

(AP)—Six years ago the Social Security Administration embarked on an aggressive plan to replace outdated computer systems overwhelmed by a growing flood of disability claims.

User comments : 0