Skip to main content

How to Cleanup Your Twitter Account From Free Follower Spam and Revoke Other Apps

There have been several high-profile Twitter hacks in recent times. That's not something that most of us need to worry about though - very few are actually prominent enough to be targeted in attacks like these.
On the other hand, most of us are guilty of being careless when it comes to granting apps access to our services - if you come across an app that promises cool features, or says it will give you followers, you might be tempted to give it access to your Twitter account, which is rather like handing over the keys to your house to someone.
Sure, giving a trusted and well-known app such as Tweetbot or Fenix, or a service such as Buffer, access to your account is fine. But at other times, it's just inviting trouble as Twitter authorisation can allow the third party to read your tweets, and also post tweets on your behalf. If you're trusting enough to fall for the wrong app, then you can quickly see the potential for malice, as we discovered recently. Quite a few people we know have recently been affected by an app that promises to help you gain free followers - authorising freeaddme.us leads to spam DMs being sent to all your followers, while your account will also start following hundreds of others. That's probably how the follower count gets added, but of course, it's not what you probably had in mind when signing up for this.
if you've been careless and gotten affected by freeaddme.us or any other malicious third party Twitter app, follow these steps immediately.

How to revoke access to third party apps that can access your Twitter account
  1. Using a computer, log in to the Twitter.com website
  2. Click on your Profile Photo on the top right hand corner
  3. Click Settings
  4. Go to ‘Apps’ from the menu on the left side
  5. Here, click ‘Revoke Access’ to any fishy sounding apps, or any app that you are not currently using This should prevent the malicious app from causing any further harm. It’s also worth pointing out that some of the high-profile in hacks prior were due to people authorising old apps for Twitter access at some point, and then forgetting about them. It is critical that you keep revoking access to apps that you don’t use from Twitter’s settings on a regular basis.
    Next, just to be on the safe side, change your password too, by going to ‘Password’ in the menu on the left.
    For added security, we also recommend you enable two-factor authentication for your Twitter account. To enable this, go to Security and Privacy. Here you can either choose verification via a push notification, which basically uses the official Twitter app you have on your phone to allow logins from other devices. Otherwise, you can set up a code-generator app like Authy or Google Authenticator to generate a six-digit code that changes every 30 seconds. After trying to log in from another machine, you’ll need to punch in the code too (which will be seen only on the devices you set up), to proceed.
    We hope that this tutorial helps you keep your Twitter away from the many malicious tools present on the Internet. If you have any more tips, let us know via the comments below.

Comments

Popular posts from this blog

How to Identify the Gender of your Twitter Followers??

Do you ever wonder what is the demographics of people who follow you on Twitter. How many of your Twitter friends are men? Or women? Or random colored eggs, people who are either too lazy to change their default avatar or maybe they are  Twitter bots . The  Graph Search of Facebook  can provide deep insights into the demographics of people who are connected with you on the social network. For instance, you can write a natural language query like “ My friends who are older than 30 ” or “ My female friends who live in Delhi ” and the answer will be available instantly. Such granular data is however not available for Twitter users. Who Follows You? Males, Females or Eggs How do you programmatically determine the gender of a person on Twitter? The  Twitter API  doesn’t provide the gender information but there’s a workaround. You can take the profile picture of a Twitter user, feed it into Siftr’s  Vision API  and it will detect the gender of the most prominent face in the photogr

How to Make Phone Numbers Callable in Google Sheets?

How to Insert Clickable Phone Numbers in Web Pages We use the simple tel protocol to convert a plain text phone number on a web page into a clickable telephone link For instance, if you click  this link  on a mobile phone, it will open the phone dialer prefilled with the specified number. There’s no need to copy-paste numbers. How to Type Phone Numbers in a Google Sheet It is a bit tricky to type phone numbers inside Google Spreadsheets. Here’s why: Phone numbers are mostly made of digits preceded by the plus (+) symbol. The problem is as soon as add the plus sign in the spreadsheet cell, it assumes that you entering a math formula and tries to calculate the value. There are two simple workarounds to this problem. You can enclose the phone number inside double quotes (“) and precede it with an equal to (=) sign. An even easier alternative is to use the single quote (‘) before the phone number. Google Sheets will then interpret the cell’s value as text and

5 real-world events which ‘prove’ that time travel actually exists

In Back to the Future, you need an expensive car, and a conveniently placed lightning bolt – but what if time travel was easier than that? What if time travellers were ALL AROUND US? The ‘time travelling hipster’ (above) is one of the creepier pieces of evidence touted as proof that time travel exists – but we’ve picked out some of the best below, including several people from black-and-white films who appear to be using mobile phones. Nigel Watson, paranormal expert and author of the UFO Investigations Manual, ‘Would time travelers from the future really be using mobile phones? Wouldn’t they use something more sophisticated and less visible? Then again Dr Who still uses a sonic screwdriver and that is so 20th Century…’ Entry by  Cervus Entry by  Chan Teik Onn Entry by  GordonHaid Entry by  gicusudoru