Skip to main content

How to Cleanup Your Twitter Account From Free Follower Spam and Revoke Other Apps

There have been several high-profile Twitter hacks in recent times. That's not something that most of us need to worry about though - very few are actually prominent enough to be targeted in attacks like these.
On the other hand, most of us are guilty of being careless when it comes to granting apps access to our services - if you come across an app that promises cool features, or says it will give you followers, you might be tempted to give it access to your Twitter account, which is rather like handing over the keys to your house to someone.
Sure, giving a trusted and well-known app such as Tweetbot or Fenix, or a service such as Buffer, access to your account is fine. But at other times, it's just inviting trouble as Twitter authorisation can allow the third party to read your tweets, and also post tweets on your behalf. If you're trusting enough to fall for the wrong app, then you can quickly see the potential for malice, as we discovered recently. Quite a few people we know have recently been affected by an app that promises to help you gain free followers - authorising freeaddme.us leads to spam DMs being sent to all your followers, while your account will also start following hundreds of others. That's probably how the follower count gets added, but of course, it's not what you probably had in mind when signing up for this.
if you've been careless and gotten affected by freeaddme.us or any other malicious third party Twitter app, follow these steps immediately.

How to revoke access to third party apps that can access your Twitter account
  1. Using a computer, log in to the Twitter.com website
  2. Click on your Profile Photo on the top right hand corner
  3. Click Settings
  4. Go to ‘Apps’ from the menu on the left side
  5. Here, click ‘Revoke Access’ to any fishy sounding apps, or any app that you are not currently using This should prevent the malicious app from causing any further harm. It’s also worth pointing out that some of the high-profile in hacks prior were due to people authorising old apps for Twitter access at some point, and then forgetting about them. It is critical that you keep revoking access to apps that you don’t use from Twitter’s settings on a regular basis.
    Next, just to be on the safe side, change your password too, by going to ‘Password’ in the menu on the left.
    For added security, we also recommend you enable two-factor authentication for your Twitter account. To enable this, go to Security and Privacy. Here you can either choose verification via a push notification, which basically uses the official Twitter app you have on your phone to allow logins from other devices. Otherwise, you can set up a code-generator app like Authy or Google Authenticator to generate a six-digit code that changes every 30 seconds. After trying to log in from another machine, you’ll need to punch in the code too (which will be seen only on the devices you set up), to proceed.
    We hope that this tutorial helps you keep your Twitter away from the many malicious tools present on the Internet. If you have any more tips, let us know via the comments below.

Comments

Popular posts from this blog

10 MOST HAUNTED PLACES IN THE WORLD

It seems that one of the most enduring aspects of cultural similarity found throughout the world involves the supernatural.  No matter where you go across the globe, you’re going to hear various legends and ghost stories…except some of these carry significantly more weight than your average campfire story.  People seem to be somewhat obsessed with what goes on after death, especially in regards to whether or not the spirits of the departed stick around.  It would be easy to say that such attention can be blamed on vivid, Hollywood inspired imaginations, but documented reports of supernatural disturbances go back several centuries in many places, underlining the fact that no matter the time period or society involved, the paranormal remains on people’s minds. Sure, many places in the world that are reputedly haunted seem more far-fetched than realistic, but there are those that have a tendency to make even the most hardened skeptic stop and reconsider.  Listed he...

How to Make Phone Numbers Callable in Google Sheets?

How to Insert Clickable Phone Numbers in Web Pages We use the simple tel protocol to convert a plain text phone number on a web page into a clickable telephone link For instance, if you click  this link  on a mobile phone, it will open the phone dialer prefilled with the specified number. There’s no need to copy-paste numbers. How to Type Phone Numbers in a Google Sheet It is a bit tricky to type phone numbers inside Google Spreadsheets. Here’s why: Phone numbers are mostly made of digits preceded by the plus (+) symbol. The problem is as soon as add the plus sign in the spreadsheet cell, it assumes that you entering a math formula and tries to calculate the value. There are two simple workarounds to this problem. You can enclose the phone number inside double quotes (“) and precede it with an equal to (=) sign. An even easier alternative is to use the single quote (‘) before the phone number. Google Sheets will then interpret the cell’...

What is Bitcoin?

Bitcoin is a form of digital currency, created and held electronically. No one controls it. Bitcoins aren’t printed, like dollars or euros – they’re produced by people, and increasingly businesses, running computers all around the world, using software that solves mathematical problems. It’s the first example of a growing category of money known as cryptocurrency. What makes it different from normal currencies? Bitcoin can be used to buy things electronically. In that sense, it’s like conventional dollars, euros, or yen, which are also traded digitally. However, bitcoin’s most important characteristic, and the thing that makes it different to conventional money, is that it is  decentralized . No single institution controls the bitcoin network. This puts some people at ease, because it means that a large bank can’t control their money. Who created it? A software developer called Satoshi Nakamoto proposed bitcoin, which was an electronic payment sys...